Table Redundancy Method for Protecting Against Fault Attacks
IEEE ACCESS(2021)
Key words
Redundancy,Encoding,Ciphers,Software,Table lookup,Encryption,Licenses,Software cryptography,block cipher,fault attacks,countermeasure
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined