Login / Signup

Scan-based Side-channel Attack against HMAC-SHA-256 Circuits Based on Isolating Bit-transition Groups Using Scan Signatures.

Daisuke OkuMasao YanagisawaNozomu Togawa
Published in: IPSJ Trans. Syst. LSI Des. Methodol. (2018)
Keyphrases
  • countermeasures
  • scan data
  • neural network
  • secret key
  • authentication protocol
  • similar patterns
  • block cipher