Login / Signup
Research and Implementation on Power Analysis Attacks for Unbalanced Data.
Xiaoyi Duan
Dong Chen
Xiaohong Fan
Xiuying Li
Ding Ding
You Li
Published in:
Secur. Commun. Networks (2020)
Keyphrases
</>
power analysis
differential power analysis
countermeasures
unbalanced data
smart card
training data
information security
efficient implementation
data sets
data mining
block cipher