Security evaluation of cryptographic modules against side-channel attack using a biased data set.
Masato MatsubayashiHendra GunturAkashi SatohPublished in: GCCE (2017)
Keyphrases
- data sets
- countermeasures
- smart card
- information security
- power analysis
- security measures
- secret key
- security properties
- security protocols
- differential power analysis
- key management
- encryption decryption
- security requirements
- authentication protocol
- cyber attacks
- security analysis
- java card
- stream cipher
- encryption scheme
- security vulnerabilities
- security mechanisms
- key agreement
- security policies
- key exchange protocol
- fuzzy vault
- cryptographic protocols
- denial of service attacks
- security management
- block cipher
- computer security
- security issues
- access control
- security services
- malicious users
- elliptic curve cryptography
- intrusion detection