<Record><identifier xmlns="http://purl.org/dc/elements/1.1/">URN:NBN:SI:DOC-NP7BAVOT</identifier><date>2024</date><creator>Pesek, Matevž</creator><creator>Štok, Tjaž</creator><relation>documents/doc/N/URN_NBN_SI_doc-NP7BAVOT_001.pdf</relation><relation>documents/doc/N/URN_NBN_SI_doc-NP7BAVOT_001.txt</relation><format format_type="type">article</format><format format_type="extent">str.</format><identifier identifier_type="DOI">10.31449/upinf.234</identifier><identifier identifier_type="ISSN">1318-1882</identifier><identifier identifier_type="COBISSID_HOST">207688707</identifier><identifier identifier_type="URN">URN:NBN:SI:doc-NP7BAVOT</identifier><language>slv</language><publisher publisher_location="Ljubljana">Slovensko društvo Informatika</publisher><source>Uporabna informatika (Ljubljana)</source><rights>InC</rights><subject language_type_id="eng">cryptanalysis</subject><subject language_type_id="eng">cryptography</subject><subject language_type_id="eng">cybersecurity</subject><subject language_type_id="slv">kibernetska varnost</subject><subject language_type_id="slv">kriptoanaliza</subject><subject language_type_id="slv">kriptografija</subject><subject language_type_id="slv">napadi prekostranskih kanalov</subject><subject language_type_id="eng">side-channel attacks</subject><title>Kibernetski napadi preko stranskih kanalov</title><title>Exploiting side-channel attacks in cybersecurity</title></Record>