2015
DOI: 10.1504/ijes.2015.069986
|View full text |Cite
|
Sign up to set email alerts
|

A DPA-resistant crypto engine for UHF RFID tag

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Encapsulating different modules with the component technology, making the channel leak model with different characteristics and analysis method can flexibility to join the simulation system, and makes the module of updates, amend, and maintenance become more convenient. And compared to PINPAS power simulation analysis, has strong scalability and configurability [5][6][7][8][9].…”
Section: The General Framework For Simulation Platformmentioning
confidence: 99%
“…Encapsulating different modules with the component technology, making the channel leak model with different characteristics and analysis method can flexibility to join the simulation system, and makes the module of updates, amend, and maintenance become more convenient. And compared to PINPAS power simulation analysis, has strong scalability and configurability [5][6][7][8][9].…”
Section: The General Framework For Simulation Platformmentioning
confidence: 99%
“…Except cache attack, embedded systems like WSNs face the problem of how to realise high performance AES on resource constricted platform (Zhu et al, 2015), especially in TDMA-based WSNs (Wang et al, 2013) that require real-time requirement. This paper propose a novel 1-T LUT implementation of AES.…”
Section: Introductionmentioning
confidence: 99%