Login / Signup
An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter - - Case Study on Protected AES -.
Hyunjin Ahn
Neil Hanley
Máire O'Neill
Dong-Guk Han
Published in:
WISA (2015)
Keyphrases
</>
power analysis
block cipher
case study
differential power analysis
smart card
countermeasures
secret key
s box
sensitive data
higher order
hash functions
lightweight
real world
application layer
fault model
software development
unsupervised learning
information security
authentication scheme
database systems