![Cryptography / Applied mathematics / Block cipher modes of operation / Block cipher / Symmetric-key algorithm / Stream cipher / Galois/Counter Mode / Data Encryption Standard / Authenticated encryption / Cryptanalysis / Public-key cryptography / Cryptographic hash function Cryptography / Applied mathematics / Block cipher modes of operation / Block cipher / Symmetric-key algorithm / Stream cipher / Galois/Counter Mode / Data Encryption Standard / Authenticated encryption / Cryptanalysis / Public-key cryptography / Cryptographic hash function](https://www.pdfsearch.io/img/946b1b0ba5d8140d40accd5e6c7742b2.jpg) Date: 2018-02-09 07:40:07Cryptography Applied mathematics Block cipher modes of operation Block cipher Symmetric-key algorithm Stream cipher Galois/Counter Mode Data Encryption Standard Authenticated encryption Cryptanalysis Public-key cryptography Cryptographic hash function | | Intrinsic Side-Channel Analysis Resistance and Efficient Masking A case study of the use of SCA-related metrics and of design strategies leading to low-cost masking for CAESAR candidatesAdd to Reading ListSource URL: ko.stoffelen.nlDownload Document from Source Website File Size: 679,11 KBShare Document on Facebook
|