<--- Back to Details
First PageDocument Content
Stream ciphers / Cryptographic hash functions / Advanced Encryption Standard / Hamming weight / Py / Lookup table / Cryptography / Keccak / NIST hash function competition
Date: 2015-04-30 21:07:24
Stream ciphers
Cryptographic hash functions
Advanced Encryption Standard
Hamming weight
Py
Lookup table
Cryptography
Keccak
NIST hash function competition

Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 480,90 KB

Share Document on Facebook

Similar Documents

PDF Document

DocID: 1xT3S - View Document

PDF Document

DocID: 1xSUq - View Document

PDF Document

DocID: 1xSLt - View Document

PDF Document

DocID: 1xSFH - View Document

PDF Document

DocID: 1xSuy - View Document