Login / Signup
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.
Sung-Ming Yen
Seungjoo Kim
Seongan Lim
Sang-Jae Moon
Published in:
ICISC (2001)
Keyphrases
</>
countermeasures
power analysis
block cipher
secret key
information security
knowledge base
data sets
real world
e learning
smart card
hash functions
real time
machine learning
three dimensional
physical world
authentication protocol