TY - BOOK AU - Hong, Seokhie TI - Side Channel Attacks KW - n/a||binary Huff curve||FPGA||post quantum cryptography||data loss||side-channel cache attacks||rsa cryptosystem||first-order analysis||chaotic circuit||integrity||ad libraries||power-analysis attack||single trace analysis||side-channel authentication||provable security||ad lib||cache misses||cache side-channel attack||leakage model||NTRU||graph||AES||hardware security||recovery of secret exponent by triangular trace analysis||side-channel attacks||information leakage||data outsourcing||CPLD||scatter-gather implementation||modular exponentiation||lattice-based cryptography||elliptic curve cryptography||Gaussian sampling||post-quantum cryptography||reliability||unified point addition||ad networks||graph similarity||mobile ads||physically unclonable function||tweakable block cipher||Merkle (hash) tree||machine-learning classification||side channel attack||online authentication||side channel analysis||financial IC card||side-channel attack||re-keying||cloud computing||cryptographic keys||chaos theory||horizontal collision correlation analysis||countermeasure||embedded system security||cache attack||single-trace attack||software development kit (SDK)||CDT sampling||key bit-dependent attack||side-channel analysis||second-order analysis||constant-time cryptographic algorithm||android package (APK)||challenge-response authentication UR - https://mdpi.com/books/pdfview/book/1339 ER -