Masking proofs are tight and how to exploit it in security evaluations (Q1648843)
From MaRDI portal
![]() | This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Masking proofs are tight and how to exploit it in security evaluations |
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Masking proofs are tight and how to exploit it in security evaluations |
scientific article |
Statements
Masking proofs are tight and how to exploit it in security evaluations (English)
0 references
9 July 2018
0 references