Prolog to "Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures"

2012 ◽  
Vol 100 (11) ◽  
pp. 3053-3055
Author(s):  
Jim Esch
Author(s):  
Henitsoa Rakotomalala ◽  
Xuan Thuy Ngo ◽  
Zakaria Najm ◽  
Jean-Luc Danger ◽  
Sylvain Guilley

2011 ◽  
Vol 1 (4) ◽  
pp. 265-270 ◽  
Author(s):  
Sho Endo ◽  
Takeshi Sugawara ◽  
Naofumi Homma ◽  
Takafumi Aoki ◽  
Akashi Satoh

Sign in / Sign up

Export Citation Format

Share Document