Login / Signup

Improving Second-Order DPA Attacks with New Modeled Power Leakages.

Miao YuanGuoqiang Bai
Published in: CIS (2015)
Keyphrases
  • countermeasures
  • differential power analysis
  • power analysis
  • power consumption
  • smart card
  • higher order
  • information security
  • cyber attacks
  • data mining
  • social networks
  • high order
  • watermarking scheme