<--- Back to Details
First PageDocument Content
NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science
Date: 2015-11-30 11:00:03
NIST hash function competition
SHA-3
Power analysis
Institute for Applied Information Processing and Communications
Cryptography
Side-channel attack
Algorithm
Mathematics
Science and technology
Science

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Download Document from Source Website

File Size: 223,65 KB

Share Document on Facebook

Similar Documents