Login / Signup
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks.
Giovanni Agosta
Alessandro Barenghi
Gerardo Pelosi
Michele Scandale
Published in:
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2015)
Keyphrases
</>
embedded software
smart card
information security
embedded systems
software architecture
development projects
block cipher
sequence diagrams
hash functions
low cost
security requirements
case study
deductive databases
development process
secret key