ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Wireless Security and Cryptography
Latest Publications
TOTAL DOCUMENTS
14
(FIVE YEARS 0)
H-INDEX
1
(FIVE YEARS 0)
Published By CRC Press
9780849387715, 9780849387692
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
WLAN Security Processing Architectures
Wireless Security and Cryptography
◽
10.1201/9780849387692.ch9
◽
2007
◽
Author(s):
Neil Smyth
◽
John McCanny
◽
Maire McLoone
Keyword(s):
Processing Architectures
Download Full-text
Efficient VLSI Architectures for the Advanced Encryption Standard Algorithm
Wireless Security and Cryptography
◽
10.1201/9780849387692.ch3
◽
2007
◽
Author(s):
Xinmiao Zhang
Keyword(s):
Advanced Encryption Standard
◽
Vlsi Architectures
◽
Standard Algorithm
Download Full-text
Smart Card Technology
Wireless Security and Cryptography
◽
10.1201/9780849387692.ch13
◽
2007
◽
Author(s):
Martin Manninger
Keyword(s):
Smart Card
Download Full-text
Table of Contents
Wireless Security and Cryptography
◽
10.1201/9780849387692.fmatt
◽
2007
◽
Download Full-text
Hardware Design Issues in Elliptic Curve Cryptography for Wireless Systems
Wireless Security and Cryptography
◽
10.1201/9780849387692.ch4
◽
2007
◽
Cited By ~ 1
Author(s):
O Koufopavlou
◽
Apostolos Fournaris
Keyword(s):
Elliptic Curve
◽
Elliptic Curve Cryptography
◽
Hardware Design
◽
Wireless Systems
◽
Design Issues
Download Full-text
Security Architecture and Implementation of the Universal Mobile Telecommunication System
Wireless Security and Cryptography
◽
10.1201/9780849387692.ch10
◽
2007
◽
Author(s):
Paris Kitsos
◽
Nicolas Sklavos
Keyword(s):
Universal Mobile Telecommunication System
◽
Security Architecture
◽
Mobile Telecommunication
◽
Telecommunication System
Download Full-text
Security Enhancement Layer for Bluetooth
Wireless Security and Cryptography
◽
10.1201/9780849387692.ch8
◽
2007
◽
Author(s):
Marko Hännikäinen
◽
Panu Hämäläinen
◽
Timo Hämäläinen
Keyword(s):
Enhancement Layer
◽
Security Enhancement
Download Full-text
Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms
Wireless Security and Cryptography
◽
10.1201/9780849387692.ch7
◽
2007
◽
Author(s):
Ingrid Verbauwhede
◽
Bart Preneel
◽
Siddika BernaO¨rs
Keyword(s):
Side Channel
◽
Side Channel Analysis
◽
Hardware Implementations
◽
Cryptographic Algorithms
◽
Channel Analysis
Download Full-text
Cryptographic Algorithms in Constrained Environments
Wireless Security and Cryptography
◽
10.1201/9780849387692.ch6
◽
2007
◽
Cited By ~ 1
Author(s):
Norbert Pramstaller
◽
Vincent Rijmen
Keyword(s):
Cryptographic Algorithms
◽
Constrained Environments
Download Full-text
Efficient Elliptic Curve Cryptographic Hardware Design for Wireless Security
Wireless Security and Cryptography
◽
10.1201/9780849387692.ch5
◽
2007
◽
Author(s):
Lo’ai Tawalbeh
◽
Çetin Kaya Koç
Keyword(s):
Elliptic Curve
◽
Hardware Design
◽
Wireless Security
◽
Cryptographic Hardware
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close