Date: 2015-11-30 11:00:03NIST hash function competition SHA-3 Power analysis Institute for Applied Information Processing and Communications Cryptography Side-channel attack Algorithm Mathematics Science and technology Science | | Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, AustriaAdd to Reading ListSource URL: www.iaik.tugraz.atDownload Document from Source Website File Size: 223,65 KBShare Document on Facebook
|