Login / Signup

Effectiveness of variable bit-length power analysis attacks on SHA-3 based MAC.

Xuan D. TranMarcin LukowiakStanislaw P. Radziszowski
Published in: MILCOM (2016)
Keyphrases
  • power analysis
  • differential power analysis
  • countermeasures
  • block cipher
  • hash functions
  • smart card
  • s box
  • information security
  • data mining
  • lightweight
  • elliptic curve
  • databases