Search results
Lecture Notes in Computer Science > Information Security Applications > Efficient Implementation > 360-374
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Efficient Implementations I > 48-64