Login / Signup
Power Analysis and Protection on SPECK and Its Application in IoT.
Jing Ge
An Wang
Liehuang Zhu
Xin Liu
Ning Shang
Guoshuang Zhang
Published in:
SecureComm (2) (2019)
Keyphrases
</>
power analysis
countermeasures
information security
smart card
differential power analysis
management system
elliptic curve
cloud computing
security requirements
block cipher
big data
wireless networks
dimensionality reduction
low cost
location information
knn
information systems