Research Article

Power Analysis Attack Based on Hamming Weight Model without Brute Force Cracking

Table 4

Comparison of computational complexity of the three schemes for DS1.

SchemeNon-force-HMForce-HMWhole byte

Computational complexity