Hardware virtualization for protection against power analysis attack.
Kai YangJungmin ParkMark M. TehranipoorSwarup BhuniaPublished in: HOST (2018)
Keyphrases
- power analysis
- countermeasures
- differential power analysis
- smart card
- ibm zenterprise
- hardware and software
- real time
- low cost
- operating system
- virtual machine
- input output
- cloud computing
- computer systems
- hardware implementation
- block cipher
- data center
- databases
- peer to peer
- embedded systems
- computational efficiency
- data integration