Exploiting Small Leakages in Masks to Turn a Second-Order...

Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

DeTrano, Alexander, Karimi, Naghmeh, Karri, Ramesh, Guo, Xiaofei, Carlet, Claude, Guilley, Sylvain
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
2015
Year:
2015
Language:
english
Journal:
The Scientific World Journal
DOI:
10.1155/2015/743618
File:
PDF, 2.81 MB
english, 2015
Conversion to is in progress
Conversion to is failed