Emerging ubiquitous devices such as WSN nodes and RFID tags, which have extremely limited resources, require complex cryptographic algorithms for security & privacy. While widely used cryptographic algorithms are known to be strong against computational resources of an attacker, the real threat comes from fault and side-channel attacks which try to extract the cryptographic key by utilizing the fl ...