Back to Results
First PageMeta Content
NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science


Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria
Add to Reading List

Document Date: 2015-11-30 11:00:03


Open Document

File Size: 223,65 KB

Share Result on Facebook
UPDATE