Login / Signup
Scan-based Side-channel Attack against HMAC-SHA-256 Circuits Based on Isolating Bit-transition Groups Using Scan Signatures.
Daisuke Oku
Masao Yanagisawa
Nozomu Togawa
Published in:
IPSJ Trans. Syst. LSI Des. Methodol. (2018)
Keyphrases
</>
countermeasures
scan data
neural network
secret key
authentication protocol
similar patterns
block cipher