<--- Back to Details
First PageDocument Content
NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science
Date: 2015-11-30 11:00:03
NIST hash function competition
SHA-3
Power analysis
Institute for Applied Information Processing and Communications
Cryptography
Side-channel attack
Algorithm
Mathematics
Science and technology
Science

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Download Document from Source Website

File Size: 223,65 KB

Share Document on Facebook

Similar Documents

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

DocID: 1xVSa - View Document

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter:  Ga¨etan Leurent

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter: Ga¨etan Leurent

DocID: 1xVB3 - View Document

LABYRINTHS Labyrinths are found in many cultures dating back as much as 3,500 years. Unlike a maze, the labyrinth is unicursal, having a single path leading to the center with no loops, cul-de-sacs or forks. They all sha

LABYRINTHS Labyrinths are found in many cultures dating back as much as 3,500 years. Unlike a maze, the labyrinth is unicursal, having a single path leading to the center with no loops, cul-de-sacs or forks. They all sha

DocID: 1v7NY - View Document

2018 年 6 月 6 日  報道資料 110 万のお尻から厳選した「美尻カレンダー」9 年分からさらに ビーチに映える 3 つの“神尻”を選抜「美尻うちわ」新発売!

2018 年 6 月 6 日 報道資料 110 万のお尻から厳選した「美尻カレンダー」9 年分からさらに ビーチに映える 3 つの“神尻”を選抜「美尻うちわ」新発売!

DocID: 1uXbf - View Document

SHA-3 Conference, August 2010, Building Power Analysis Resistant Implementations of Keccak

SHA-3 Conference, August 2010, Building Power Analysis Resistant Implementations of Keccak

DocID: 1uIvf - View Document