Login / Signup
[x] and some cryptographic applications.
Carl Löndahl
Thomas Johansson
Published in:
Des. Codes Cryptogr. (2014)
Keyphrases
</>
smart card
hash functions
case study
machine learning
key management
digital signature
encryption key
data sets
databases
image processing
s box
security properties
random number generator
high assurance
random number generators
differential power analysis