![NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science](https://www.pdfsearch.io/img/af8edaf8bded85b971f89a215adc0242.jpg) Date: 2015-11-30 11:00:03NIST hash function competition SHA-3 Power analysis Institute for Applied Information Processing and Communications Cryptography Side-channel attack Algorithm Mathematics Science and technology Science | | Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, AustriaAdd to Reading ListSource URL: www.iaik.tugraz.atDownload Document from Source Website File Size: 223,65 KBShare Document on Facebook
|