Power analysis of hardware implementations protected with secret sharing
2000 ◽
Vol 8
(1)
◽
pp. 18-24
◽
Keyword(s):
Keyword(s):