Masking proofs are tight and how to exploit it in security evaluations (Q1648843)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Masking proofs are tight and how to exploit it in security evaluations |
scientific article; zbMATH DE number 6900709
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Masking proofs are tight and how to exploit it in security evaluations |
scientific article; zbMATH DE number 6900709 |
Statements
Masking proofs are tight and how to exploit it in security evaluations (English)
0 references
9 July 2018
0 references
0.9246321
0 references
0.9051037
0 references
0.88395196
0 references
0 references
0.8688266
0 references
0.86713415
0 references
0.86480856
0 references