Cryptology ePrint Archive: Report 2015/597
Available versions in chronological order
20150621:165149 (posted 21-Jun-2015 16:51:49 UTC)
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
Amir Moradi and Alexander Wild
Original publication (with minor differences): IACR-CHES-2015
[
Cryptology ePrint archive
]