Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
4
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,142
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Cryptographic Engineering
Electromagnetic Attacks and Countermeasures
other
Author(s):
Pankaj Rohatgi
Publication date
(Print):
2009
Publisher:
Springer US
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
4
Record
: found
Abstract
: not found
Book Chapter
: not found
Electromagnetic Analysis: Concrete Results
Karine Gandolfi
,
Christophe Mourtel
,
Francis Olivier
(2001)
0
comments
Cited
75
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Electromagnetic radiation from video display units: An eavesdropping risk?
Wim van Eck
(1985)
0
comments
Cited
28
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
Markus G. Kuhn
,
Ross Anderson
(1998)
0
comments
Cited
23
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 407-430
DOI:
10.1007/978-0-387-71817-0_15
SO-VID:
080cf63e-b6e3-47bd-b367-606ac35a08e7
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
About Cryptographic Engineering
pp. 5
Random Number Generators for Cryptographic Applications
pp. 25
Evaluation Criteria for Physical Random Number Generators
pp. 55
True Random Number Generators for Cryptography
pp. 75
Fast Finite Field Multiplication
pp. 105
Efficient Unified Arithmetic for Hardware Cryptography
pp. 125
Spectral Modular Arithmetic for Cryptography
pp. 171
Elliptic and Hyperelliptic Curve Cryptography
pp. 191
Instruction Set Extensions for Cryptographic Applications
pp. 235
FPGA and ASIC Implementations of AES
pp. 295
Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs
pp. 321
Block Cipher Modes of Operation from a Hardware Implementation Perspective
pp. 365
Basics of Side-Channel Analysis
pp. 381
Improved Techniques for Side-Channel Analysis
pp. 407
Electromagnetic Attacks and Countermeasures
pp. 431
Leakage from Montgomery Multiplication
pp. 451
Randomized Exponentiation Algorithms
pp. 475
Microarchitectural Attacks and Countermeasures
Similar content
2,142
Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
Authors:
Konstantinos Tsiknas
,
Dimitrios Taketzis
,
Konstantinos Demertzis
…
Research on the Countermeasures for the Coordinated Development of Digital Economy and Green Finance
Authors:
Simulation of large-scale deformation of ultra-soft peaty ground under test embankment loading and investigation of effective countermeasures against residual settlement and failure
Authors:
Mutsumi Tashiro
,
Son Nguyen
,
Motohiro Inagaki
…
See all similar
Cited by
6
A Primer on Hardware Security: Models, Methods, and Metrics
Authors:
Masoud Rostami
,
Farinaz Koushanfar
,
Ramesh Karri
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip
Authors:
J. Longo
,
E. De Mulder
,
D. Page
…
A Survey on Hardware Security: Current Trends and Challenges
Authors:
Sonia Akter
,
Kasem Khalil
,
Magdy Bayoumi
See all cited by