1
Published 2010
Table of Contents: ... for Efficient Inversion in and Conversion Matrices of SubBytes of AES -- SHA-3 -- Developing a Hardware...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ... of Masked AES Hardware Implementations -- A Generalized Method of Differential Fault Attack Against AES...
View full text
Electronic eBook