Login / Signup
A Simple Power Analysis Attack on the Twofish Key Schedule.
Jose Javier Gonzalez Ortiz
Kevin J. Compton
Published in:
CoRR (2016)
Keyphrases
</>
power analysis
countermeasures
block cipher
differential power analysis
smart card
scheduling problem
databases
np hard
knowledge management
scheduling algorithm
hash functions
security analysis
elliptic curve