Login / Signup
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2.
Yaacov Belenky
Ira Dushar
Valery Teper
Vadim Bugaenko
Oleg Karavaev
Leonid Azriel
Yury Kreimer
Published in:
IACR Trans. Cryptogr. Hardw. Embed. Syst. (2023)
Keyphrases
</>
differential power analysis
power analysis
smart card
s box
information security
countermeasures
hash functions
databases