<--- Back to Details
First PageDocument Content
Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt
Date: 2015-11-30 11:00:03
Cryptography
NIST hash function competition
Cryptographic hash functions
SHA-3
Side-channel attack
Power analysis
Crypt

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Download Document from Source Website

File Size: 183,25 KB

Share Document on Facebook

Similar Documents