Cryptology ePrint Archive: Report 2013/637
Available versions in chronological order
20131005:134510 (posted 05-Oct-2013 13:45:10 UTC)
Detection of Algebraic Manipulation in the Presence of Leakage
Hadi Ahmadi and Reihaneh Safavi-Naini
Original publication (with minor differences): ICITS 2013
[
Cryptology ePrint archive
]