First Page | Document Content | |
---|---|---|
Date: 2011-10-03 19:52:55Power analysis Side channel attack Message authentication codes Stream ciphers Cryptographic hash functions Differential cryptanalysis Avalanche effect VEST Block cipher modes of operation Cryptography Espionage Advanced Encryption Standard | J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysisAdd to Reading ListSource URL: ftp.cryptography.comDownload Document from Source WebsiteFile Size: 1,16 MBShare Document on Facebook |