Correlation power attack on a message authentication code based on SM3.
Ye YuanKaige QuLiji WuJia-Wei MaXiangmin ZhangPublished in: Frontiers Inf. Technol. Electron. Eng. (2019)
Keyphrases
- authentication protocol
- authentication mechanism
- power consumption
- encryption decryption
- biometric authentication
- security mechanisms
- source code
- data encryption
- image authentication
- detecting malicious
- user authentication
- secret key
- security issues
- communication channels
- student model
- correlation coefficient
- open source