Login / Signup
A Simple Power Analysis Attack on the Serpent Key Schedule.
Kevin J. Compton
Brian Timm
Joel VanLaven
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
block cipher
power analysis
differential power analysis
s box
hash functions
secret key
lightweight
smart card
countermeasures
databases
end to end
encryption algorithm
high dimensional
application layer