Researchclopedia
Research
Researchers
Institutions
Topics
Submit
About
Search...
⌘
K
Command Palette
Search for a command to run...
Back to research
Using Second-Order Power Analysis to Attack DPA Resistant Software
2000
477 citations
Book Chapter
Field-Weighted Citation Impact:
9.23
Using Second-Order Power Analysis to Attack DPA Resistant Software | Researchclopedia