Security analysis of asynchronous-logic QDI cell approach for differential power analysis attack.
Weng-Geng HoAli Akbar PammuNan LiuKyaw Zwa Lwin NeKwen-Siong ChongBah-Hwee GweePublished in: ISIC (2016)
Keyphrases
- security analysis
- differential power analysis
- smart card
- power analysis
- authentication protocol
- security requirements
- secret key
- information security
- authentication scheme
- security properties
- encryption algorithm
- user authentication
- security mechanisms
- image encryption
- mutual authentication
- s box
- encryption scheme
- similarity measure
- privacy preserving
- password guessing
- peer to peer