Sign in

Differential Power Analysis on Dynamic Password Token Based on SM3 Algorithm, and Countermeasures.

Limin GuoLihui WangQing LiJun YuPeng Luo
Published in: CIS (2015)
Keyphrases
  • countermeasures
  • learning algorithm
  • optimization algorithm
  • information security
  • computational efficiency
  • real world
  • power analysis
  • differential power analysis