Login / Signup

On Practical Second-Order Power Analysis Attacks for Block Ciphers.

Renato MenicocciAndrea SimonettiGiuseppe ScottiAlessandro Trifiletti
Published in: ICICS (2010)
Keyphrases
  • block cipher
  • power analysis
  • differential power analysis
  • countermeasures
  • hash functions
  • s box
  • smart card
  • lightweight
  • secret key
  • application layer
  • feature selection
  • data analysis
  • databases
  • security protocols