Cited By
View all- Yumbul KErdem SSavas E(2014)On Selection of Modulus of Quadratic Codes for the Protection of Cryptographic Operations against Fault AttacksIEEE Transactions on Computers10.1109/TC.2012.23663:5(1182-1196)Online publication date: 1-May-2014
- Mathew JJabir AShafik RPradhan D(2013)Power-Efficient Fault-Tolerant Finite Field MultiplierEnergy-Efficient Fault-Tolerant Systems10.1007/978-1-4614-4193-9_8(269-306)Online publication date: 12-Jul-2013
- Yumbul KErdem SSavas E(2011)On Protecting Cryptographic Applications Against Fault Attacks Using Residue CodesProceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography10.1109/FDTC.2011.14(69-79)Online publication date: 29-Sep-2011
- Show More Cited By