Cryptology ePrint Archive: Report 2015/597

Available versions in chronological order


Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
Amir Moradi and Alexander Wild
Original publication (with minor differences): IACR-CHES-2015


[ Cryptology ePrint archive ]