Table 8.
Resistance to side-channel attacks.
| Attacks | Liao | Zhao | Alamr | Naeem | Dinarvand | Benssalah | Zheng | Yang | Aloui | Izza | |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Security of Transmitted Data | |||||||||||
| SCA | SPA | - | - | - | No | - | No | - | No | Yes | No |
| DPA | Yes | Yes | Yes | No | Yes | No | Yes | No | Yes | No | |
| DEMA | Yes | Yes | Yes | No | Yes | No | Yes | No | Yes | No | |
| Security of Secret Keys | |||||||||||
| SCA | SPA | Yes | Yes | - | - | - | - | - | - | - | - |
| DPA | No | No | No | No | Yes | No | No | No | No | No | |
| DEMA | No | No | No | No | Yes | No | No | No | No | No | |