Login / Signup
Unprotected and Masked Hardware Implementations of Spook v2.
Charles Momin
Gaëtan Cassiers
François-Xavier Standaert
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
worst case scenario
dos attacks
response time
special case
data analysis
computational complexity
upper bound
e government
web services
optimal solution
np hard
semi supervised
energy consumption
knowledge discovery
data warehouse
information sources