Towards secure cryptographic software implementation against side-channel power analysis attacks.
Pei LuoLiwei ZhangYunsi FeiA. Adam DingPublished in: ASAP (2015)
Keyphrases
- power analysis
- software implementation
- differential power analysis
- smart card
- block cipher
- security requirements
- countermeasures
- security mechanisms
- authentication scheme
- hardware implementation
- s box
- hash functions
- single chip
- security protocols
- key management
- cryptographic protocols
- elliptic curve
- lightweight
- secret key
- stream cipher
- information security
- field programmable gate array
- hardware design
- image processing algorithms
- efficient implementation
- initial conditions
- resource constrained
- security issues
- cryptographic algorithms
- image processing