Login / Signup
DPA Leakage Evaluation and Countermeasure Plug-in.
Ming Tang
Xiaorong Wang
Zhenlong Qiu
Si Gao
Huanguo Zhang
Qianhong Wu
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
countermeasures
power analysis
image processing
evaluation method
real world
social networks
image segmentation
email
smart card
information security
evaluation measures
evaluation metrics