Login / Signup
Attacks and countermeasures on AES and ECC.
Henrik Tange
Birger Andersen
Published in:
WPMC (2013)
Keyphrases
</>
countermeasures
cryptographic algorithms
information security
elliptic curve cryptography
power analysis
encryption algorithm
security measures
java card
error correction
advanced encryption standard
rural areas
cyber attacks
security analysis
secret key
elliptic curve
public key
information systems