Attacking AES-Masking Encryption Device with Correlation Power Analysis.
Septafiansyah Dwi PutraAdang Suwandi AhmadSarwono SutiknoYusuf KurniawanPublished in: Int. J. Commun. Networks Inf. Secur. (2018)
Keyphrases
- power analysis
- block cipher
- secret key
- smart card
- differential power analysis
- encryption algorithm
- advanced encryption standard
- s box
- encryption algorithms
- countermeasures
- data encryption standard
- hash functions
- information security
- cryptographic algorithms
- security analysis
- lightweight
- encryption decryption
- authentication scheme
- elliptic curve
- key management
- human visual system
- ciphertext
- encryption scheme
- security protocols
- pseudorandom
- database systems
- security mechanisms
- efficient implementation
- virtual private network
- anomaly detection