Sign in

Research and Implementation on Power Analysis Attacks for Unbalanced Data.

Xiaoyi DuanDong ChenXiaohong FanXiuying LiDing DingYou Li
Published in: Secur. Commun. Networks (2020)
Keyphrases
  • power analysis
  • differential power analysis
  • countermeasures
  • unbalanced data
  • smart card
  • training data
  • information security
  • efficient implementation
  • data sets
  • data mining
  • block cipher