Loading...

On Non-Completeness and G-Equivariance

With the growing threat of the side-channel attack (SCA) to the cryptographic algorithm’s implementations, the masking method has become one of the most promising SCA countermeasures for securely implementing, for example, block ciphers. The basic principle of the masking method is that if...

Fuld beskrivelse

Na minha lista:
Bibliografiske detaljer
Hovedforfatter: Yoo-Jin Baek
Format: Artigo
Sprog:Inglês
Udgivet: MDPI AG 2019-11-01
Serier:Applied Sciences
Fag:
Online adgang:https://www.mdpi.com/2076-3417/9/21/4692
Tags: Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!