Research Article

Power Analysis Attack Based on Hamming Weight Model without Brute Force Cracking

Table 5

Comparison of computational complexity of the three schemes for DS2.

SchemeNon-Force-HMForce-HMWhole byte

Computational complexity