2018
DOI: 10.1016/j.future.2017.06.004
|View full text |Cite
|
Sign up to set email alerts
|

Correlation power analysis of modes of encryption in AES and its countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…After verification testing was started at various clock rates, the issue arose. Verification tests have failed due to false static energy compared to the major reason for this study suggested by Fahd et al [21].…”
Section: Background To the Energy Prediction Modelsmentioning
confidence: 78%
“…After verification testing was started at various clock rates, the issue arose. Verification tests have failed due to false static energy compared to the major reason for this study suggested by Fahd et al [21].…”
Section: Background To the Energy Prediction Modelsmentioning
confidence: 78%
“…However, in the modern sense of confidentiality, data integrity, and entity authentication are all aspects of information security that the science of cryptography addresses. So the notion of modern cryptography is not only dealing with message hiding but more than a set of techniques that provide information security [3], [15], [18]- [22].…”
Section: Research Methods 21 Cryptographymentioning
confidence: 99%
“…Where the ECB operating mode has an operating pattern on N blocks separately with the same K secret key and has no connection between one block and another. While the CBC mode of operation, uses the initial vector input to build the encoding linkage between one block and the next block [15], [16].…”
Section: Introductionmentioning
confidence: 99%
“…In this mode, a 128-bit initialization vector is XORed with the first block to be encrypted then the resulting ciphertext is XORed with the second block before being encrypted, the process is repeated until the last block. However, this key-chaining nature of CBC requires more processing time [20][21][22].…”
Section: Cipher Block Chaining Modementioning
confidence: 99%