Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications
Keyword(s):
2009 ◽
Vol 3
(1)
◽
pp. 61-72
◽
Keyword(s):