vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms

The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would he...

Full description

Bibliographic Details
Main Authors: Roman Gevorkovich Korkikian, Evgeny Yurievich Rodionov, Alexander Vladimirovich Mamaev
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2014-05-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/213