Login / Signup
Correlation power analysis attack against STT-MRAM based cyptosystems.
Abhishek Chakraborty
Ankit Mondal
Ankur Srivastava
Published in:
HOST (2017)
Keyphrases
</>
power analysis
differential power analysis
countermeasures
smart card
design considerations
block cipher
elliptic curve
information systems
information security
response time
correlation coefficient
secret key