2019
DOI: 10.1007/s13389-019-00215-5
|View full text |Cite
|
Sign up to set email alerts
|

Physical model of sensitive data leakage from PC-based cryptographic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…The practical significance 22 of game parties is shown in Table 1. [37][38][39][40] Economic man hypothesis. The main purpose of the game subjects is to maximize their own interests.…”
Section: Model Assumptionsmentioning
confidence: 99%
“…The practical significance 22 of game parties is shown in Table 1. [37][38][39][40] Economic man hypothesis. The main purpose of the game subjects is to maximize their own interests.…”
Section: Model Assumptionsmentioning
confidence: 99%
“…This phenomenon also applies to other digital standards that are used in the processing of information in electrical form [16]. In any case, the sources of undesirable signals must be protected by applying solutions that prevent the effective conduct of the infiltration process [6,[17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…Modern SCAs use many non-invasive ways to measure leakage, for example, electromagnetic signals [7,8] or acoustic cryptanalysis [9,10]. More works about different SCA on various cryptographic algorithms can be found in [11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%