![]() | ![]() |
2005 | ||
---|---|---|
9 | EE | Tom Caddy: Common Criteria. Encyclopedia of Cryptography and Security 2005 |
8 | EE | Tom Caddy: Differential Power Analysis. Encyclopedia of Cryptography and Security 2005 |
7 | EE | Tom Caddy: FIPS 140-2. Encyclopedia of Cryptography and Security 2005 |
6 | EE | Tom Caddy: Penetration Testing. Encyclopedia of Cryptography and Security 2005 |
5 | EE | Tom Caddy, Gerrit Bleumer: Security Evaluation Criteria. Encyclopedia of Cryptography and Security 2005 |
4 | EE | Tom Caddy: Side-Channel Attacks. Encyclopedia of Cryptography and Security 2005 |
3 | EE | Tom Caddy: Tamper Detection. Encyclopedia of Cryptography and Security 2005 |
2 | EE | Tom Caddy: Tamper Resistance. Encyclopedia of Cryptography and Security 2005 |
1 | EE | Tom Caddy: Tamper Response. Encyclopedia of Cryptography and Security 2005 |
1 | Gerrit Bleumer | [5] |