Cryptographic protocols; Software measurement; Information security; Cellular phones; Wearable computers
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/light-567757_1920.jpg?itok=wSTRk8KZ)
Wearable and low power devices are vulnerable to side-channel attacks, which can retrieve private data (like sensitive data or the private key of a cryptographic algorithm) based on externally measured magnitudes, like power consumption. These attacks have a high dependence on the data being encrypted -- the more variable it is, the more information an attacker will have for performing it. This database contains ECG data measured with a wearable sensorized garment during different levels of activity.
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/finger-2081169_1280_0_0.jpg?itok=258dfL52)
Supplemental material for paper "Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms."
- Categories: