Login / Signup
Counting Keys in Parallel After a Side Channel Attack.
Daniel P. Martin
Jonathan F. O'Connell
Elisabeth Oswald
Martijn Stam
Published in:
ASIACRYPT (2) (2015)
Keyphrases
</>
secret key
countermeasures
power analysis
smart card
parallel processing
public key
ciphertext
authentication scheme
parallel implementation
authentication protocol
hash functions
key management
key distribution
data sets
information security
general purpose
parallel computation
distributed memory