Login / Signup
Power Analysis of Hardware Implementations Protected with Secret Sharing.
Guido Bertoni
Joan Daemen
Nicolas Debande
Thanh-Ha Le
Michaël Peeters
Gilles Van Assche
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
secret sharing
power analysis
secret sharing scheme
differential power analysis
smart card
countermeasures
multi party
elliptic curve
visual cryptography scheme
key management
encryption scheme
information security
block cipher
secret image