Login / Signup
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys.
Anca Radulescu
Pantelimon George Popescu
Marios O. Choudary
Published in:
IACR Trans. Cryptogr. Hardw. Embed. Syst. (2022)
Keyphrases
</>
smart card
hash functions
encryption scheme
intrusion detection
information security
access control
security protocols
secret key
security mechanisms
cryptographic protocols
countermeasures
key management
security properties
block cipher
security services
provably secure
random number generator