Linked e-resources
Details
Table of Contents
Introduction
Analysis of Reconfigurability of Cryptographic Algorithms
Hardware Architecture
Compilation Techniques
Case Studies in Design
Countermeasures against Physical Attacks
Perspective: Application Trends.
Analysis of Reconfigurability of Cryptographic Algorithms
Hardware Architecture
Compilation Techniques
Case Studies in Design
Countermeasures against Physical Attacks
Perspective: Application Trends.