Login / Signup

Clockwise Randomization of the Observable Behaviour of Crypto ASICs to Counter Side Channel Attacks.

Zoya DykaChristian WittkePeter Langendörfer
Published in: DSD (2015)
Keyphrases
  • smart card
  • privacy preserving
  • data sets
  • query optimization
  • security protocols
  • database
  • information retrieval
  • access control
  • digital signature