Login / Signup
Comparing low and medium cost computer-based technologies suitable for cryptographic attacks.
V. Gayoso Martínez
Luis Hernández Encinas
Agustín Martín Muñoz
Oscar Martinez-Graullera
Published in:
Log. J. IGPL (2019)
Keyphrases
</>
security protocols
differential power analysis
smart card
countermeasures
cryptographic protocols
support systems
security risks
advanced encryption standard
high cost
stream cipher
cryptographic algorithms
watermarking scheme
security mechanisms
power analysis
intrusion detection and prevention