First Page | Document Content | |
---|---|---|
Date: 2015-11-30 11:00:03Cryptography NIST hash function competition Cryptographic hash functions SHA-3 Side-channel attack Power analysis Crypt | Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, AustriaAdd to Reading ListSource URL: www.iaik.tugraz.atDownload Document from Source WebsiteFile Size: 183,25 KBShare Document on Facebook |