Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
56
views
30
references
Top references
cited by
20
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
919
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – ASIACRYPT 2014
Higher-Order Threshold Implementations
other
Author(s):
Begül Bilgin
,
Benedikt Gierlichs
,
Svetla Nikova
,
Ventzislav Nikov
,
Vincent Rijmen
Publication date
(Print):
2014
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Higher order chromatin architecture
Most cited references
30
Record
: found
Abstract
: not found
Book Chapter
: not found
PRESENT: An Ultra-Lightweight Block Cipher
A. Bogdanov
,
L. Knudsen
,
G. Leander
…
(2007)
0
comments
Cited
140
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
François-Xavier Standaert
,
Tal G. Malkin
,
Moti Yung
(2009)
0
comments
Cited
73
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
Christophe De Cannière
,
Orr Dunkelman
,
Miroslav M. Knežević
(2009)
0
comments
Cited
65
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 326-343
DOI:
10.1007/978-3-662-45608-8_18
SO-VID:
436b22e1-ef19-475f-a1cb-6923f680f5e0
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 22
Efficient Identity-Based Encryption over NTRU Lattices
pp. 439
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
pp. 62
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead
pp. 63
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
pp. 82
Adaptive Security of Constrained PRFs
pp. 158
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
pp. 274
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
pp. 326
Higher-Order Threshold Implementations
pp. 406
Composable Security of Delegated Quantum Computation
pp. 532
Square Span Programs with Applications to Succinct NIZK Arguments
Similar content
919
Identification of Cardiac Magnetic Resonance Imaging Thresholds for Risk Stratification in Pulmonary Arterial Hypertension
Authors:
Robert Lewis
,
Christopher Johns
,
Marcella Cogliano
…
Boundary Formation through a Direct Threshold-Based Readout of Mobile Small RNA Gradients
Authors:
Damianos Skopelitis
,
Anna H. Benkovics
,
Aman Husbands
…
Systematic review of the impact of health care expenditure on health outcome measures: implications for cost-effectiveness thresholds.
Authors:
Mac Ardy Junio Gloria
,
Montarat Thavorncharoensap
,
Usa Chaikledkaew
…
See all similar
Cited by
20
Consolidating Masking Schemes
Authors:
Oscar Reparaz
,
Begul Bilgin
,
Svetla Nikova
…
Leakage Assessment Methodology
Authors:
Tobias Schneider
,
Amir Moradi
Randomness Complexity of Private Circuits for Multiplication
Authors:
Sonia Belaïd
,
Fabrice Benhamouda
,
Alain Passelègue
…
See all cited by