z-logo
open-access-imgOpen Access
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images
Author(s) -
Abdel Alim Kamal,
Roger Zahno,
Amr M. youssef
Publication year - 2013
Publication title -
hal (le centre pour la communication scientifique directe)
Language(s) - English
Resource type - Conference proceedings
Subject(s) - cryptography , computer science , cryptographic primitive , cryptographic protocol , algebraic number , theoretical computer science , embedded system , computer security , mathematics , mathematical analysis

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here