Login / Signup
Horizontal Attacks against ECC: from Simulations to ASIC.
Ievgen Kabin
Zoya Dyka
Dan Klann
Peter Langendoerfer
Published in:
CoRR (2022)
Keyphrases
</>
countermeasures
application specific
integrated circuit
design methodology
numerical simulations
hardware implementation
circuit design
traffic analysis
cryptographic algorithms
watermarking scheme
error correction
security analysis
error correcting
malicious users
chosen plaintext