Publication not explained

This publication has not yet been explained in plain language by the author(s). However, you can still read the publication.

If you are one of the authors, claim this publication so you can create a plain language summary to help more people find, understand and use it.

Featured Image

Read the Original

This page is a summary of: The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, August 2015, Institute of Electrical & Electronics Engineers (IEEE),
DOI: 10.1109/tcad.2015.2430320.
You can read the full text:

Read

Contributors

The following have contributed to this page