Power Consumption versus Hardware Security: Feasibility Study of Differential Power Attack on Linear Feedback Shift Register Based Stream Ciphers and Its Countermeasures.
Sanjay BurmanSeetal PotluriDebdeep MukhopadhyayKamakoti VeezhinathanPublished in: J. Low Power Electron. (2016)
Keyphrases
- power consumption
- countermeasures
- information security
- security measures
- low power
- shift register
- random number generator
- power saving
- power management
- cyber attacks
- energy efficiency
- battery life
- java card
- power reduction
- real time
- low power consumption
- energy saving
- power analysis
- security issues
- security requirements
- low cost
- network security
- smart card
- information systems
- rfid tags
- block cipher
- security management
- hardware implementation
- parallel processing
- intrusion detection
- anomaly detection