Abstract
A trace contains sample points, some of which contain useful information that can be used to obtain a key in side-channel attacks. We used public data......
小提示:本篇文献需要登录阅读全文,点击跳转登录