<--- Back to Details
First PageDocument Content
NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science
Date: 2015-11-30 11:00:03
NIST hash function competition
SHA-3
Power analysis
Institute for Applied Information Processing and Communications
Cryptography
Side-channel attack
Algorithm
Mathematics
Science and technology
Science

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Download Document from Source Website

File Size: 223,65 KB

Share Document on Facebook

Similar Documents

VLSI  Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security Uniform Evaluation of Hardware Implementations of the

VLSI Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security Uniform Evaluation of Hardware Implementations of the

DocID: 1thuP - View Document

Revocation in Group Signature Schemes Advisor(s): Daniel Slamanig and Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Revocation in Group Signature Schemes Advisor(s): Daniel Slamanig and Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1sPc1 - View Document

Compiler Assisted Software Hardening Advisor(s): Mario Werner Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Literature

Compiler Assisted Software Hardening Advisor(s): Mario Werner Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Literature

DocID: 1sNXm - View Document

Framework for automated cryptanalysis of authenticated ciphers Advisor(s): Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Framework for automated cryptanalysis of authenticated ciphers Advisor(s): Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1sJwi - View Document

Tower Extensions of Finite Fields Advisor(s): Christian Hanser and Sebastian Ramacher Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Tower Extensions of Finite Fields Advisor(s): Christian Hanser and Sebastian Ramacher Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1sDk2 - View Document