Cited By
View all- Chang DYung M(2023)Midgame Attacks and Defense Against ThemCyber Security, Cryptology, and Machine Learning10.1007/978-3-031-34671-2_33(471-492)Online publication date: 21-Jun-2023
- Kaur PKumar NSingh M(2022)Biometric cryptosystems: a comprehensive surveyMultimedia Tools and Applications10.1007/s11042-022-13817-982:11(16635-16690)Online publication date: 30-Sep-2022
- Bellizia DBronchain OCassiers GGrosso VGuo CMomin CPereira OPeters TStandaert F(2020)Mode-Level vs. Implementation-Level Physical Security in Symmetric CryptographyAdvances in Cryptology – CRYPTO 202010.1007/978-3-030-56784-2_13(369-400)Online publication date: 17-Aug-2020
- Show More Cited By