Login / Signup
Transition Recovery Attack on Embedded State Machines Using Power Analysis.
Clay Carper
Andey Robins
Mike Borowczak
Published in:
ICCD (2022)
Keyphrases
</>
power analysis
state machines
countermeasures
differential power analysis
state machine
smart card
petri net
elliptic curve
block cipher
fault tolerant
embedded systems
recurrent networks
information security
secret key
reactive systems
neural network
watermarking algorithm
information systems