Author:
Bertoni Guido,Martinoli Marco
Publisher
Springer International Publishing
Reference17 articles.
1. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Building power analysis resistant implementations of Keccak. In: Second SHA-3 Candidate Conference (2010)
2. Lecture Notes in Computer Science;G Bertoni,2013
3. Lecture Notes in Computer Science;B Bilgin,2014
4. Lecture Notes in Computer Science;B Bilgin,2014
5. Brzozowski, J., Ésik, Z.: Hazard algebras. Formal Methods Syst. Des. 23(3), 223–256 (2003)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献