Cited By
View all- Cassiers GMasure LMomin CMoos TMoradi AStandaert F(2024)Randomness Generation for Secure Hardware Masking – Unrolled Trivium to the RescueIACR Communications in Cryptology10.62056/akdkp2fgxOnline publication date: 8-Jul-2024
- Assael GElbaz-Vincent P(2024)Provably Secure and Area-Efficient Modular Addition over Boolean SharesIACR Communications in Cryptology10.62056/aee0zoja5Online publication date: 8-Jul-2024
- Mahdion NOswald E(2024)Efficiently Detecting Masking Flaws in Software ImplementationsIACR Communications in Cryptology10.62056/ab89ksdjaOnline publication date: 7-Oct-2024
- Show More Cited By