Sign in

Vulnerability analysis for crypto devices against probing attack.

Lingxiao WeiJie ZhangFeng YuanYannan LiuJunfeng FanQiang Xu
Published in: ASP-DAC (2015)
Keyphrases
  • countermeasures
  • handheld devices
  • mobile devices
  • mobile applications
  • secret key
  • processing capabilities
  • low power consumption
  • information systems
  • low cost