Sign in

Algorithm-Based Countermeasures against Power Analysis Attacks for Public-Key Cryptography SM2.

Xiaowei HanBeibei WangAn WangLiji WuWoogeun Rhee
Published in: CIS (2014)
Keyphrases
  • countermeasures
  • power analysis
  • information security
  • differential power analysis
  • similarity measure
  • cost effective
  • java card