Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane. Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. In Sehun Kim, Moti Yung, Hyung-Woo Lee, editors, Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers. Volume 4867 of Lecture Notes in Computer Science, pages 317-332, Springer, 2007. [doi]
No reviews for this publication, yet.