Abstract
In practice, adversaries may be able to acquire a part of private state of cryptographic system via side-channel attacks, on account of unexpected phy......
小提示:本篇文献需要登录阅读全文,点击跳转登录