Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Momin, C., Standaert, F.-X., & Verhamme, C.

Journal title: IACR Transactions on Cryptographic Hardware and Embedded Systems

Journal number: 3

Journal publisher: The International Association for Cryptologic Research

Published year: 2025

DOI identifier: 10.46586/TCHES.V2025.I3.717-744

ISSN: 2569-2925