Login / Signup

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2.

Yaacov BelenkyIra DusharValery TeperVadim BugaenkoOleg KaravaevLeonid AzrielYury Kreimer
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst. (2023)
Keyphrases
  • differential power analysis
  • power analysis
  • smart card
  • s box
  • information security
  • countermeasures
  • hash functions
  • databases