More Detail for a Combined Timing and Power Attack against Implementations of RSA.

Werner SchindlerColin D. Walter
Published in: IMACC (2003)
Keyphrases
  • power consumption
  • efficient implementation
  • real time
  • countermeasures
  • public key
  • power analysis
  • secret key
  • authentication protocol
  • digital signature
  • detection mechanism
  • malicious users
  • modular exponentiation