Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.
Elisabeth OswaldStefan MangardChristoph HerbstStefan TillichPublished in: CT-RSA (2006)
Keyphrases
- power analysis
- differential power analysis
- smart card
- block cipher
- s box
- secret key
- countermeasures
- information security
- efficient implementation
- security mechanisms
- security requirements
- remote user authentication scheme
- lightweight
- java card
- digital signature
- authentication scheme
- initial conditions
- security analysis
- security protocols