Login / Signup

How Resistant are Sboxes to Power Analysis Attacks?

Keanhong BoeyMáire O'NeillRoger F. Woods
Published in: NTMS (2011)
Keyphrases
  • power analysis
  • differential power analysis
  • countermeasures
  • smart card
  • block cipher
  • elliptic curve
  • security requirements
  • information security