Security Evaluation of Cryptographic Modules against Profiling Attacks.
Yongdae KimNaofumi HommaTakafumi AokiHeebong ChoiPublished in: ICISC (2012)
Keyphrases
- security protocols
- security mechanisms
- cryptographic protocols
- java card
- smart card
- stream cipher
- security threats
- cyber attacks
- cryptographic algorithms
- security properties
- security measures
- denial of service attacks
- security problems
- key management
- countermeasures
- security vulnerabilities
- fault injection
- intrusion detection
- block cipher
- computer security
- encryption scheme
- security requirements
- security issues
- information security
- differential power analysis
- malicious users
- identity theft
- wireless sensor networks
- encryption decryption
- advanced encryption standard