has been cited by the following article(s):
[1]
|
Software Implementation of AES-128: Side Channel Attacks Based on Power Traces Decomposition
2022 International Conference on Cyber Warfare and Security (ICCWS),
2022
DOI:10.1109/ICCWS56285.2022.9998437
|
|
|
[2]
|
Model for capturing noise free traces for Side Channel Power Cryptanalysis based on SAKURA-G FPGA and Case study of AES
2022 International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC),
2022
DOI:10.1109/ICMACC54824.2022.10093672
|
|
|
[3]
|
Model for capturing noise free traces for Side Channel Power Cryptanalysis based on SAKURA-G FPGA and Case study of AES
2022 International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC),
2022
DOI:10.1109/ICMACC54824.2022.10093672
|
|
|