Back to Results
First PageMeta Content
Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt


Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria
Add to Reading List

Document Date: 2015-11-30 11:00:03


Open Document

File Size: 183,25 KB

Share Result on Facebook