Cryptology ePrint Archive: Report 2012/578
Available versions in chronological order
20121016:130509 (posted 16-Oct-2012 13:05:09 UTC)
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
[
Cryptology ePrint archive
]