Login / Signup
On Randomizing Private Keys to Counteract DPA Attacks.
Nevine Maurice Ebeid
M. Anwar Hasan
Published in:
Selected Areas in Cryptography (2003)
Keyphrases
</>
countermeasures
differential power analysis
power analysis
smart card
information security
privacy preserving
s box
traffic analysis
secret key
database
information systems
relational databases
hash functions
security issues