On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms.
Jakub BreierDirmanto JapXiaolu HouShivam BhasinPublished in: IEEE Trans. Inf. Forensics Secur. (2020)
Keyphrases
- cryptographic algorithms
- security mechanisms
- countermeasures
- smart card
- advanced encryption standard
- data encryption standard
- security protocols
- security issues
- information security
- security systems
- elliptic curve cryptography
- access control
- biometric data
- resource constrained
- security requirements
- secret key
- digital signature
- pseudorandom
- public key infrastructure
- operating system
- wireless sensor networks
- elliptic curve
- security analysis
- block cipher
- security services