David Hely
Home
Publications
Research
Teaching
Contact
clocks
Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique
Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?
Cite
×