Timing leakage to break SM2 signature algorithm.
Aidong ChenChen HongXinna ShangHongyuan JingSen XuPublished in: J. Inf. Secur. Appl. (2022)
Keyphrases
- optimization algorithm
- expectation maximization
- times faster
- k means
- learning algorithm
- input data
- dynamic programming
- computational cost
- simulated annealing
- single pass
- theoretical analysis
- particle filter
- linear programming
- experimental evaluation
- cost function
- search space
- objective function
- multiscale
- segmentation algorithm
- face recognition
- improved algorithm
- selection algorithm
- recognition algorithm
- similarity measure
- experimental study
- clustering method
- probabilistic model
- artificial neural networks
- np hard
- motion estimation