搜索结果: 1-1 共查到“Secure Implementations”相关记录1条 . 查询时间(0.12 秒)
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Authenticated Encryption KETJE SHA-3
2018/11/19
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using the...