Cite

HARVARD Citation

    DeTrano, A. et al. (2015). Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets. TheScientificWorldjournal. p. . [Online]. 
  
Back to record