Keyphrases
- differential power analysis
- smart card
- block cipher
- power analysis
- countermeasures
- secret key
- hash functions
- s box
- malicious users
- authentication protocol
- key management
- digital signature
- denial of service attacks
- security protocols
- encryption decryption
- neural network
- security properties
- malicious attacks
- abstract argumentation
- encryption key
- data mining