Fingerprint
Dive into the research topics of 'Power-balancing software implementation to mitigate side-channel attacks without using look-up tables'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Han Bit Kim, Hee Seok Kim, Seokhie Hong
Research output: Contribution to journal › Article › peer-review