Two Operands of Multipliers in Side-Channel Attack.
Takeshi SugawaraDaisuke SuzukiMinoru SaekiPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- countermeasures
- power analysis
- secret key
- information security
- smart card
- attack detection
- security measures
- detection mechanism
- data corruption
- database
- block cipher
- cyber attacks
- authentication protocol
- lagrangian relaxation
- e government
- search algorithm
- objective function
- decision trees
- genetic algorithm
- information retrieval
- neural network