Login / Signup
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
Nicolas Veyrat-Charvillon
Benoît Gérard
François-Xavier Standaert
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
computing power
computational power
storage capacity
embedded systems
processing power
statistical databases
intrusion detection
security mechanisms
security requirements
query language
security policies
information security
network security
smart card
security analysis
low cost
data model
memory hierarchy