Systematic Literature Review of EM-SCA Attacks on Encryption.
Muhammad Rusyaidi ZunaidiAsanka P. SayakkaraMark ScanlonPublished in: CoRR (2024)
Keyphrases
- literature review
- stream cipher
- case study
- information systems development
- advanced encryption standard
- cryptographic algorithms
- expectation maximization
- fuzzy theory
- cryptographic protocols
- public libraries
- countermeasures
- current issues
- em algorithm
- block cipher
- maximum likelihood
- encryption algorithms
- encryption scheme
- design science
- higher education institutions
- watermarking scheme
- watermarking algorithm
- security mechanisms
- security analysis
- secret key
- probabilistic model
- real world