Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures -- Provably Secure...