41
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found

      Consolidating Masking Schemes

      other

      Read this book at

      Publisher
      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references22

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Private Circuits: Securing Hardware against Probing Attacks

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Provably Secure Higher-Order Masking of AES

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Using Second-Order Power Analysis to Attack DPA Resistant Software

                Bookmark

                Author and book information

                Book Chapter
                2015
                August 1 2015
                : 764-783
                10.1007/978-3-662-47989-6_37
                9d951f68-4f5f-4b2e-8df0-a839da8c0074
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,228

                Cited by15