Login / Signup
Analysis of Two Countermeasures Against the Signal Leakage Attack.
Ke Wang
Haodong Jiang
Published in:
AFRICACRYPT (2019)
Keyphrases
</>
countermeasures
information security
data analysis
security measures
databases
decision making
supervised learning
signal processing
smart card
java card
differential power analysis