Login / Signup
On Practical Second-Order Power Analysis Attacks for Block Ciphers.
Renato Menicocci
Andrea Simonetti
Giuseppe Scotti
Alessandro Trifiletti
Published in:
ICICS (2010)
Keyphrases
</>
block cipher
power analysis
differential power analysis
countermeasures
hash functions
s box
smart card
lightweight
secret key
application layer
feature selection
data analysis
databases
security protocols