Login / Signup

DPA vulnerability analysis on Trivium stream cipher using an optimized power model.

Erica Tena-SánchezAntonio J. Acosta
Published in: ISCAS (2015)
Keyphrases
  • similarity measure
  • power consumption
  • wireless communication