Abstract
Leakage of private state information (e.g. the secret keys) through various leakage attacks (e.g. side channel attacks, cold-boot attacks, etc) has be......
小提示:本篇文献需要登录阅读全文,点击跳转登录