Claire Whelan, D. Page, F. Vercauteren, Michael Scott, W. Marnane
{"title":"Implementation Attacks & Countermeasures","authors":"Claire Whelan, D. Page, F. Vercauteren, Michael Scott, W. Marnane","doi":"10.3233/978-1-58603-947-9-226","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Identity-Based Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/978-1-58603-947-9-226","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}