Masking proofs are tight and how to exploit it in security evaluations (Q1648843)
From MaRDI portal
!
WARNING
This is the item page for this Wikibase entity, intended for internal use and editing purposes.
Please use the normal view instead:
scientific article; zbMATH DE number 6900709
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Masking proofs are tight and how to exploit it in security evaluations |
scientific article; zbMATH DE number 6900709 |
Statements
Masking proofs are tight and how to exploit it in security evaluations (English)
0 references
9 July 2018
0 references
0.9246321
0 references
0.9051037
0 references
0.88395196
0 references
0 references
0.8688266
0 references
0.86713415
0 references
0.86480856
0 references