For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
A White-box Cryptographic Implementation for Protecting against Power Analysis
IEICE TRANSACTIONS on Information and Systems
Full Text: PDF(396.9KB)