Login / Signup

Vulnerability modeling of cryptographic hardware to power analysis attacks.

Amir MoradiMahmoud SalmasizadehMohammad T. Manzuri ShalmaniThomas Eisenbarth
Published in: Integr. (2009)
Keyphrases
  • differential power analysis
  • power analysis
  • smart card
  • countermeasures
  • low cost
  • information security
  • block cipher
  • s box
  • random number generator
  • data sharing