http://www.w3.org/ns/prov#value | - nc.Cryptographic computation using masking to prevent differential power analysis and other attacks* Cited by examinerNon-Patent CitationsReference1 *Chari et al, Towards Sound Approaches to Counteract Power-Analysis Attacks", Aug. 1999, Crypto '99, p. 398-412.2Chari et al., Towards Sound Approaches To Counteract Power-Analysis Attacks.3 *Kocker et al, Differential Power Analysis", Cryptography
|