Login / Signup

Cryptographic implications of Hess' generalized GHS attack.

Alfred MenezesEdlyn Teske
Published in: Appl. Algebra Eng. Commun. Comput. (2006)
Keyphrases
  • differential power analysis
  • block cipher
  • secret key
  • smart card
  • neural network
  • countermeasures
  • hash functions
  • encryption key
  • data mining
  • secure communication
  • malicious users