Login / Signup

Leakage Power Analysis attacks against a bit slice implementation of the Serpent block cipher.

Massimo AliotoSimone BongiovanniGiuseppe ScottiAlessandro Trifiletti
Published in: MIXDES (2014)
Keyphrases
  • block cipher
  • power analysis
  • differential power analysis
  • s box
  • hash functions
  • lightweight
  • secret key
  • application layer
  • low cost
  • efficient implementation
  • countermeasures
  • security protocols