Loading...

On Non-Completeness and G-Equivariance

With the growing threat of the side-channel attack (SCA) to the cryptographic algorithm’s implementations, the masking method has become one of the most promising SCA countermeasures for securely implementing, for example, block ciphers. The basic principle of the masking method is that if...

Full description

Saved in:
Bibliographic Details
Main Author: Yoo-Jin Baek
Format: Artigo
Language:Inglês
Published: MDPI AG 2019-11-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/9/21/4692
Tags: Add Tag
No Tags, Be the first to tag this record!