Login / Signup
Vulnerability modeling of cryptographic hardware to power analysis attacks.
Amir Moradi
Mahmoud Salmasizadeh
Mohammad T. Manzuri Shalmani
Thomas Eisenbarth
Published in:
Integr. (2009)
Keyphrases
</>
differential power analysis
power analysis
smart card
countermeasures
low cost
information security
block cipher
s box
random number generator
data sharing