Browsing Scholarly Works - Computer Science and Technology by Type "Book or Book Chapter"
Now showing items 1-1 of 1
(Springer, 2014)Template attacks remain a powerful side-channel technique to eavesdrop on tamper-resistant hardware. They model the probability distribution of leaking signals and noise to guide a search for secret data values. In practice, ...