Login / Signup
Leakage Power Analysis attacks against a bit slice implementation of the Serpent block cipher.
Massimo Alioto
Simone Bongiovanni
Giuseppe Scotti
Alessandro Trifiletti
Published in:
MIXDES (2014)
Keyphrases
</>
block cipher
power analysis
differential power analysis
s box
hash functions
lightweight
secret key
application layer
low cost
efficient implementation
countermeasures
security protocols