vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would he...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2014-05-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/213 |
Summary: | The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would help mastering various implementation-based attacks. |
---|---|
ISSN: | 2074-7128 2074-7136 |