Table 8.
Resistance to side-channel attacks.
Attacks | Liao | Zhao | Alamr | Naeem | Dinarvand | Benssalah | Zheng | Yang | Aloui | Izza | |
---|---|---|---|---|---|---|---|---|---|---|---|
Security of Transmitted Data | |||||||||||
SCA | SPA | - | - | - | No | - | No | - | No | Yes | No |
DPA | Yes | Yes | Yes | No | Yes | No | Yes | No | Yes | No | |
DEMA | Yes | Yes | Yes | No | Yes | No | Yes | No | Yes | No | |
Security of Secret Keys | |||||||||||
SCA | SPA | Yes | Yes | - | - | - | - | - | - | - | - |
DPA | No | No | No | No | Yes | No | No | No | No | No | |
DEMA | No | No | No | No | Yes | No | No | No | No | No |