Login / Signup

Scan attack in presence of mode-reset countermeasure.

Sk Subidh AliSamah Mohamed SaeedOzgur SinanogluRamesh Karri
Published in: IOLTS (2013)
Keyphrases
  • countermeasures
  • power analysis
  • information security
  • databases
  • real world
  • social networks
  • scan data
  • computer vision
  • case study
  • secret key