Correlation power analysis attack on software implementation of TRIVIUM stream cipher.
Rangana De SilvaIranga NavaratnaMalitha KumarasiriChuah Chai WenJanaka AlawatugodaPublished in: Int. J. Inf. Comput. Secur. (2022)
Keyphrases
- power analysis
- software implementation
- stream cipher
- smart card
- secret key
- differential power analysis
- countermeasures
- single chip
- block cipher
- hardware implementation
- security analysis
- hash functions
- pseudorandom
- authentication scheme
- information security
- wireless channels
- key management
- elliptic curve
- ciphertext
- security mechanisms
- spatial correlation
- security requirements
- hardware and software