Side-channel attacks, countermeasures, and evaluations
From NUEESS
(Difference between revisions)
Line 1: | Line 1: | ||
==General== | ==General== | ||
- | [http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information. | + | [http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information. There are several attack methods, among which the power analysis is of our particular interest. |
Revision as of 14:37, 30 May 2012
General
Side channel attack on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information. There are several attack methods, among which the power analysis is of our particular interest.
Whos here now: Members 0 Guests 0 Bots & Crawlers 1 |