Exploring power attack protection of resource constrained encryption engines using integrated low-drop-out regulators.
Arvind SinghMonodeep KarJong Hwan KoSaibal MukhopadhyayPublished in: ISLPED (2015)
Keyphrases
- resource constrained
- key management
- resource constraints
- wireless sensor networks
- sensor networks
- secret key
- resource limitations
- data protection
- security mechanisms
- encryption algorithm
- ciphertext
- visual sensor networks
- multipath
- power consumption
- privacy protection
- data sets
- information security
- rfid tags
- digital watermark
- data encryption
- leader follower