Login / Signup
Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors.
Armin Krieg
Johannes Grinschgl
Christian Steger
Reinhold Weiss
Holger Bock
Andreas Genser
Josef Haid
Published in:
J. Inf. Secur. Appl. (2013)
Keyphrases
</>
smart card
information leakage
secret key
authentication scheme
security requirements
authentication protocol
software development
information security
security mechanisms
remote user authentication scheme
security analysis
java card
differential power analysis
source code
software architecture