Sciweavers

21 search results - page 5 / 5
» A Comparison of Reverse Engineering Tools Based on Design Pa...
Sort
View
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
13 years 10 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak