Date: 2015-04-30 21:07:24Stream ciphers Cryptographic hash functions Advanced Encryption Standard Hamming weight Py Lookup table Cryptography Keccak NIST hash function competition | | Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern UniAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 480,90 KBShare Document on Facebook
|