Sign in

A flexible leakage trace collection setup for arbitrary cryptographic IP cores.

Athanassios MoschosApostolos P. FournarisOdysseas G. Koufopavlou
Published in: HOST (2018)
Keyphrases
  • smart card
  • database
  • application layer