Login / Signup
Practical Setup Time Violation Attacks on AES.
Nidhal Selmane
Sylvain Guilley
Jean-Luc Danger
Published in:
EDCC (2008)
Keyphrases
</>
cryptographic algorithms
advanced encryption standard
block cipher
countermeasures
security protocols
neural network
real world
data mining
practical application
fault model
chosen plaintext