Security of Prime Field Pairing Cryptoprocessor against Differential Power Attack.
Santosh GhoshDipanwita Roy ChowdhuryPublished in: InfoSecHiComNet (2011)
Keyphrases
- information security
- security measures
- countermeasures
- key exchange protocol
- security issues
- encryption algorithm
- authentication protocol
- security vulnerabilities
- security risks
- computer security
- malicious users
- authentication mechanism
- security requirements
- power consumption
- security mechanisms
- denial of service attacks
- fault injection
- intrusion detection
- electric power systems
- cyber attacks
- information leakage
- forensic analysis
- information systems
- key management
- access control