The DFA/DFT-based hacking techniques and countermeasures: Case study of the 32-bit AES encryption crypto-core.
Mouna KarmaniNoura BenhadjyoussefBelgacem HamdiMohsen MachhoutPublished in: IET Comput. Digit. Tech. (2021)
Keyphrases
- advanced encryption standard
- countermeasures
- case study
- encryption algorithms
- s box
- data encryption standard
- information security
- differential power analysis
- cryptographic algorithms
- encryption algorithm
- power analysis
- encryption decryption
- discrete fourier transform
- java card
- rural areas
- fault model
- real world
- private key
- cyber attacks
- regular expressions
- security measures
- frequency domain
- block cipher
- lightweight
- knowledge management