Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version

From MaRDI portal
Publication:2010587






Cites work







This page was built for publication: Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010587)