Login / Signup
Using Second-Order Power Analysis to Attack DPA Resistant Software.
Thomas S. Messerges
Published in:
CHES (2000)
Keyphrases
</>
power analysis
differential power analysis
countermeasures
smart card
software development
computer systems
source code
elliptic curve
user interface
software systems
higher order
software architecture
embedded systems
block cipher
data mining