Login / Signup

The DFA/DFT-based hacking techniques and countermeasures: Case study of the 32-bit AES encryption crypto-core.

Mouna KarmaniNoura BenhadjyoussefBelgacem HamdiMohsen Machhout
Published in: IET Comput. Digit. Tech. (2021)
Keyphrases