Login / Signup

Two Step Power Attack on SHA-3 Based MAC.

Chun-Yi ChuMarcin Lukowiak
Published in: MIXDES (2018)
Keyphrases
  • power consumption
  • post processing
  • artificial intelligence
  • multi step
  • real time
  • databases
  • neural network
  • query processing
  • preprocessing step
  • countermeasures
  • duty cycle