Login / Signup
Simulated Leakage Power Analysis Attack of the Trivium Stream Cipher.
Kenneth Palma
Francesc Moll
Published in:
DCIS (2022)
Keyphrases
</>
power analysis
stream cipher
smart card
secret key
differential power analysis
countermeasures
security analysis
block cipher
hash functions
pseudorandom
authentication protocol
elliptic curve
high security
authentication scheme
information security
key management
security requirements