Login / Signup
A code morphing methodology to automate power analysis countermeasures.
Giovanni Agosta
Alessandro Barenghi
Gerardo Pelosi
Published in:
DAC (2012)
Keyphrases
</>
power analysis
countermeasures
differential power analysis
smart card
information security
sql injection
source code
rural areas
cyber attacks
decision making
java card
information warfare
e learning
software engineering
elliptic curve
databases
database