Login / Signup
DPA vulnerability analysis on Trivium stream cipher using an optimized power model.
Erica Tena-Sánchez
Antonio J. Acosta
Published in:
ISCAS (2015)
Keyphrases
</>
similarity measure
power consumption
wireless communication