Power model in power analysis attack
A mapping relation model should be established between data value and power value which is collected from device under attack when the power analysis attack accuse.The sensitive information can be fund through the power trace analysis using this type of relation.Hamming distance model and hamming we...
Saved in:
Main Authors: | Peng LUO, Deng-guo FENG, Yong-bin ZHOU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.037/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Improvement of equivalent power consumption coding secure against power analysis attacks
by: WU Zhen, et al.
Published: (2010-01-01) -
Simple power analysis attack on random pseudo operations
by: Min WANG, et al.
Published: (2012-05-01) -
VLSI implementation of AES algorithm against differential power attack and differential fault attack
by: HAN Jun, et al.
Published: (2010-01-01) -
Simple power analysis attack against cryptosystems based on Montgomery algorithm
by: Gang GAN, et al.
Published: (2013-08-01) -
Research and simulation of timing attacks on ECC
by: Hui-hui JIA, et al.
Published: (2016-04-01)