Research Article

Research and Implementation on Power Analysis Attacks for Unbalanced Data

Figure 7

The second byte Pearson’s correlation coefficient diagram.