Publication:

ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data

 
dc.contributor.authorMiteloudi, Konstantina
dc.contributor.authorBatina, Lejla
dc.contributor.authorDaemen, Joan
dc.contributor.authorMentens, Nele
dc.contributor.imecauthorMentens, Nele
dc.date.accessioned2023-06-08T13:11:32Z
dc.date.available2022-11-10T03:03:17Z
dc.date.available2023-06-08T13:11:32Z
dc.date.issued2022
dc.identifier.doi10.1007/978-3-031-04580-6_19
dc.identifier.eisbn978-3-031-04580-6
dc.identifier.isbn978-3-031-04579-0
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/40714
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage288
dc.source.conference21st International Conference on Embedded Computer Systems - Architectures, Modeling, and Simulation (SAMOS)
dc.source.conferencedateJUL 04-08, 2021
dc.source.conferencelocationVirtual
dc.source.endpage299
dc.source.journalLecture Notes in Computer Science
dc.source.numberofpages12
dc.source.volume13227
dc.subject.keywordsDIFFERENTIAL FAULT ANALYSIS
dc.subject.keywordsATTACKS
dc.subject.keywordsCIPHER
dc.title

ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: