Login / Signup
Improving Second-Order DPA Attacks with New Modeled Power Leakages.
Miao Yuan
Guoqiang Bai
Published in:
CIS (2015)
Keyphrases
</>
countermeasures
differential power analysis
power analysis
power consumption
smart card
higher order
information security
cyber attacks
data mining
social networks
high order
watermarking scheme