aewag / physical-attack-collection

0 stars 0 forks source link

Herbst_2009 #632

Open aewag opened 1 week ago

aewag commented 1 week ago

WDYT? Is this publication in scope?

@inbook{Herbst_2009,
 author = {Herbst, Christoph and Medwed, Marcel},
 booktitle = {Information Security Applications},
 doi = {10.1007/978-3-642-00306-6_1},
 isbn = {9783642003066},
 issn = {1611-3349},
 pages = {1–13},
 publisher = {Springer Berlin Heidelberg},
 title = {Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation},
 url = {http://dx.doi.org/10.1007/978-3-642-00306-6_1},
 year = {2009}
}

URL: http://dx.doi.org/10.1007/978-3-642-00306-6_1 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1007/978-3-642-00306-6_1

aewag commented 1 week ago

Yes