Login / Signup

Exploiting ROLLO's constant-time implementations with a single-trace analysis.

Agathe CheriereLina MortajineTania RichmondNadia El Mrabet
Published in: Des. Codes Cryptogr. (2024)
Keyphrases