Maskingscheme相关论文
Due to its provable security and remarkable device-independence,masking has been widely accepted as a noteworthy algorit......
The Chinese hash algorithm SM3 is verified to be secure enough, but improper hardware implementation may lead to leakage......