Exploiting small leakages in masks to turn a second-order attack into a first-order attack

Alexander Detrano, Sylvain Guilley, Xiaofei Guo, Naghmeh Karimi, Ramesh Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fingerprint

Dive into the research topics of 'Exploiting small leakages in masks to turn a second-order attack into a first-order attack'. Together they form a unique fingerprint.

Keyphrases

Computer Science