Protecting secret keys in networked devices with table encoding against power analysis attacks.
Taesung KimSeungkwang LeeDooho ChoiHyunsoo YoonPublished in: J. High Speed Networks (2016)
Keyphrases
- power analysis
- secret key
- smart card
- differential power analysis
- block cipher
- authentication scheme
- secure communication
- countermeasures
- stream cipher
- pseudorandom
- security mechanisms
- information security
- key distribution
- authentication protocol
- key management
- encryption scheme
- security requirements
- diffie hellman
- ciphertext
- forward secure
- security analysis
- public key
- signature scheme
- key agreement
- rfid tags
- information systems