@dblp

Exploiting small leakages in masks to turn a second-order attack into a first-order attack.

, , , , and . HASP@ISCA, page 7:1-7:5. ACM, (2015)

Links and resources

Tags