Used together with:
rout
(1)
attack
(1)
des
(1)
success
(1)
constraint
(1)
Stem
cryptoprocessor$ (
all stems
)
1 papers:
DATE-2009-SauvageGDMN
#constraints
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints (
LS
,
SG
,
JLD
,
YM
,
MN
), pp. 640–645.
Bibliography of Software Language Engineering in Generated Hypertext
(
BibSLEIGH
) is created and maintained by
Dr. Vadim Zaytsev
.
Hosted as a part of
SLEBOK
on
GitHub
.