Login / Signup
Power analysis of hardware implementations protected with secret sharing.
Guido Bertoni
Joan Daemen
Nicolas Debande
Thanh-Ha Le
Michaël Peeters
Gilles Van Assche
Published in:
MICRO Workshops (2012)
Keyphrases
</>
secret sharing
power analysis
secret sharing scheme
countermeasures
differential power analysis
smart card
multi party
visual cryptography scheme
elliptic curve
visual cryptography
encryption scheme
key management
secret image
block cipher
image data
information security
power consumption