Login / Signup

Practical Setup Time Violation Attacks on AES.

Nidhal SelmaneSylvain GuilleyJean-Luc Danger
Published in: EDCC (2008)
Keyphrases
  • cryptographic algorithms
  • advanced encryption standard
  • block cipher
  • countermeasures
  • security protocols
  • neural network
  • real world
  • data mining
  • practical application
  • fault model
  • chosen plaintext