Tighter, faster, simpler side-channel security evaluations beyond computing power.
Daniel J. BernsteinTanja LangeChristine van VredendaalPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- computing power
- processing power
- computational power
- information security
- embedded systems
- storage capacity
- security requirements
- smart card
- countermeasures
- upper bound
- intrusion detection
- access control
- security issues
- network security
- lower bound
- security analysis
- memory efficient
- security policies
- memory hierarchy
- power analysis
- statistical databases
- artificial intelligence
- parallel processing
- data processing
- cooperative
- information systems