Načítá se...
On Non-Completeness and G-Equivariance
With the growing threat of the side-channel attack (SCA) to the cryptographic algorithm’s implementations, the masking method has become one of the most promising SCA countermeasures for securely implementing, for example, block ciphers. The basic principle of the masking method is that if...
Uloženo v:
Hlavní autor: | |
---|---|
Médium: | Artigo |
Jazyk: | Inglês |
Vydáno: |
MDPI AG
2019-11-01
|
Edice: | Applied Sciences |
Témata: | |
On-line přístup: | https://www.mdpi.com/2076-3417/9/21/4692 |
Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
|