Back to Results
First PageMeta Content
Tamper resistance / Public-key cryptography / Power analysis / Encryption / Computer security / Timing attack / Password / Key size / Secure cryptoprocessor / Cryptography / Security / Espionage


Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE
Add to Reading List

Document Date: 2005-08-19 15:38:40


Open Document

File Size: 208,58 KB

Share Result on Facebook
UPDATE