First Page | Document Content | |
---|---|---|
Date: 2005-08-19 15:38:40Tamper resistance Public-key cryptography Power analysis Encryption Computer security Timing attack Password Key size Secure cryptoprocessor Cryptography Security Espionage | Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEEAdd to Reading ListSource URL: www.cs.dartmouth.eduDownload Document from Source WebsiteFile Size: 208,58 KBShare Document on Facebook |