Evaluating Resistance of Mcml Technology to Power Analysis Attacks Using A Simulation-Based Methodology
TRANSACTIONS ON COMPUTATIONAL SCIENCE IV SPECIAL ISSUE ON SECURITY IN COMPUTING(2009)
Key words
power consumption,MCML technology,MCML trace,power analysis attack,power profile,different logic style,different type,similar side-channel attack,successful attack,AES algorithm,MCML Technology,Power Analysis Attacks,Simulation-Based Methodology
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined