Login / Signup
Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures.
Timo Bartkewitz
Sven Bettendorf
Thorben Moos
Amir Moradi
Falk Schellenberg
Published in:
IACR Trans. Cryptogr. Hardw. Embed. Syst. (2022)
Keyphrases
</>
countermeasures
experimental evaluation
information security
sql injection
rural areas
security measures
cyber attacks
java card
power analysis
source code
database
smart card
developing countries
data flow
security requirements
control flow
security breaches
information warfare