A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks.
Virginia Zúñiga-GonzálezErica Tena-SánchezAntonio J. AcostaPublished in: DCIS (2023)
Keyphrases
- advanced encryption standard
- cryptographic algorithms
- block cipher
- s box
- differential power analysis
- encryption algorithms
- security protocols
- power analysis
- security mechanisms
- encryption algorithm
- countermeasures
- elliptic curve cryptography
- fault model
- private key
- security measures
- biometric data
- smart card
- encryption decryption
- secret key
- low cost
- security problems
- java card
- software implementation
- security systems
- public key infrastructure
- efficient implementation
- information security
- authentication scheme
- authentication protocol
- elliptic curve
- data encryption
- resource constrained
- public key