DRAFT of 2020 May 28 Markku-Juhani O. Saarinen <[email protected]>
Many cryptographic functions require computation of Boolean functions from n bits to m bits. Sometimes these functions are large enough to have been traditionally implemented with table lookups, but timing side-channel considerations force their implementation in a bit-sliced manner.