16.2 A Keccak-based wireless authentication tag with per-query key update and power-glitch attack countermeasures.
Chiraag JuvekarHyung-Min LeeJoyce KwongAnantha P. ChandrakasanPublished in: ISSCC (2016)
Keyphrases
- countermeasures
- information security
- power analysis
- query processing
- keywords
- database
- wireless networks
- java card
- security measures
- cyber attacks
- differential power analysis
- data sources
- information flow
- wireless local area network
- block cipher
- power consumption
- information systems
- security requirements
- mobile devices
- case study
- defense mechanisms