Login / Signup

Power analysis of hardware implementations protected with secret sharing.

Guido BertoniJoan DaemenNicolas DebandeThanh-Ha LeMichaël PeetersGilles Van Assche
Published in: MICRO Workshops (2012)
Keyphrases