Security wrappers and power analysis for SoC technologies.
Catherine H. GebotysY. ZhangPublished in: CODES+ISSS (2003)
Keyphrases
- power analysis
- countermeasures
- information security
- smart card
- differential power analysis
- elliptic curve
- security requirements
- block cipher
- security mechanisms
- security and privacy issues
- data extraction
- security issues
- data mining
- network security
- access control
- intrusion detection
- information extraction
- key management
- ad hoc networks
- information systems
- security policies
- semi structured