First Page | Document Content | |
---|---|---|
![]() Date: 2014-12-15 16:36:18Revision control Software development process Technical communication Chmod Cp Ls Computing Software Version control | Add to Reading List |
![]() | On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cpDocID: 1xUIc - View Document |
![]() | CP_publi_mortalites_huitresDocID: 1xTs5 - View Document |
![]() | PDF DocumentDocID: 1xvIi - View Document |
![]() | PDF DocumentDocID: 1xu2L - View Document |
![]() | PDF DocumentDocID: 1xt6l - View Document |