Author:
Putra Septafiansyah Dwi,Sumari Arwin Datumaya Wahyudi,Ahmad Adang Suwandi,Sutikno Sarwono,Kurniawan Yusuf
Publisher
Springer International Publishing
Reference27 articles.
1. Hess E, Janssen N, Meyer B, Schutze T Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures, p 10
2. Joux A (2009) Algorithmic cryptanalysis. CRC Press, Boca Raton
3. Kocher PC (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Advances in Cryptology — CRYPTO ‘96. Springer, Berlin/Heidelberg, pp 104–113
4. Kocher P, Jaffe J, Jun B, Rohatgi P (2011) Introduction to differential power analysis. J Cryptogr Eng 1:5–27
5. Messerges TS, Dabbish EA, Sloan RH (1999) Investigations of power analysis attacks on smartcards. In: Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, Berkeley, CA, USA, pp 17–17
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Artificial Intelligence based Security Solution for Data Encryption using AES Algorithm;2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS);2023-03-23
2. A perspective on a non-binary knowledge growing system in a pattern recognition use-case;6TH INTERNATIONAL CONFERENCE ON CIVIL ENGINEERING FOR SUSTAINABLE DEVELOPMENT (ICCESD 2022);2023
3. A Fast Electrical Distribution Fault Predictor using Knowledge Growing System (KGS);2022 11th Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS);2022-08-23
4. Pandemic dynamics prediction in Java using the Moving Average method and the Knowledge Growing System (KGS);Jurnal Teknologi dan Sistem Komputer;2020-10-24