![]() |
Volumn 2260, Issue , 2001, Pages 44-62
|
A technique with an information-theoretic basis for protecting secret data from differential power attacks
a
NONE
(South Africa)
|
Author keywords
[No Author keywords available]
|
Indexed keywords
INFORMATION THEORY;
SMART CARDS;
COMPUTATIONAL CONSTRAINTS;
CRYPTOGRAPHIC DEVICES;
DIFFERENTIAL POWER ANALYSIS;
DIFFERENTIAL POWER ATTACKS;
INFORMATION LEAKAGE;
INFORMATION-THEORETIC APPROACH;
REAL-WORLD SYSTEM;
SECRET INFORMATION;
SIDE CHANNEL ATTACK;
|
EID: 84946839450
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/3-540-45325-3_6 Document Type: Conference Paper |
Times cited : (20)
|
References (5)
|