![Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm](https://www.pdfsearch.io/img/7172ca634c571290f1b55bfdc86e0955.jpg) Date: 2014-03-28 15:45:17Cryptography Stream ciphers Advanced Encryption Standard Differential fault analysis Block cipher VEST Data Encryption Standard Fault model Fault injection Side-channel attack Common Scrambling Algorithm | | IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices toAdd to Reading ListSource URL: euler.ecs.umass.eduDownload Document from Source Website File Size: 1,53 MBShare Document on Facebook
|