Login / Signup

Leakage Power Analysis attacks: Effectiveness on DPA resistant logic styles under process variations.

Milena DjukanovicLuca GiancaneGiuseppe ScottiAlessandro TrifilettiMassimo Alioto
Published in: ISCAS (2011)
Keyphrases
  • power analysis
  • differential power analysis
  • countermeasures
  • smart card
  • data mining
  • knowledge discovery
  • knowledge management
  • elliptic curve