Login / Signup
Cryptographic implications of Hess' generalized GHS attack.
Alfred Menezes
Edlyn Teske
Published in:
Appl. Algebra Eng. Commun. Comput. (2006)
Keyphrases
</>
differential power analysis
block cipher
secret key
smart card
neural network
countermeasures
hash functions
encryption key
data mining
secure communication
malicious users