Differences between revisions 15 and 18 (spanning 3 versions)
Size: 693
Comment:
|
Size: 1081
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 11: | Line 11: |
* [[attachment:EMC11_rsademod.pdf|Identification of information leakage spots on a cryptographic device with an RSA processor (EMC2011)]] | * [[attachment:EMC11_rsademod.pdf|O. Meynard, Y. Hayashi, N. Homma, S. Guilley, J-L Danger, “Identification of information leakage spots on a cryptographic device with an RSA processor,” EMC2011, pp. 773-778, Long Beach, August 2011|&do=get]] * [[attachment:DATE_11_enhancement.pdf|O. Meynard, D. Real, S. Guilley, J-L. Danger, and N. Homma, “Enhancement of Simple Electro-Magnetic Attacks by Pre-characterization in Frequency Domain and Demodulation Techniques,” DATE2011, pp. 1004-1009, March, 2011.|&do=get]] |
CHES'11 Posters
Modeling, simulation
EMA