Login / Signup
Vulnerability analysis for crypto devices against probing attack.
Lingxiao Wei
Jie Zhang
Feng Yuan
Yannan Liu
Junfeng Fan
Qiang Xu
Published in:
ASP-DAC (2015)
Keyphrases
</>
countermeasures
handheld devices
mobile devices
mobile applications
secret key
processing capabilities
low power consumption
information systems
low cost