Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Emerging Topics in Computing"
DOI: 10.1109/tetc.2020.3048498
Abstract: When the chaotic block cryptographic algorithms are performed on hardware devices, the leakages of power consumption etc. are crucial information which can be used to analyse the security of the cryptosystems. Template Attack (TA) can…
read more here.
Keywords:
machine;
based similarity;
machine learning;
similarity attacks ... See more keywords