vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would he...
Main Authors: | Roman Gevorkovich Korkikian, Evgeny Yurievich Rodionov, Alexander Vladimirovich Mamaev |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2014-05-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/213 |
Similar Items
-
cryptographic Primitives: Insertions, Examples and Open Problems
by: Stanislav Olegovich Dordzhiev, et al.
Published: (2014-02-01) -
Secure and Efficient Implementations of Cryptographic Primitives
by: Guo, Xu
Published: (2014) -
Structure Attacks in Cryptographic Protocols
by: Mahlburg, Karl
Published: (2001) -
Cryptographic mechanisms for secure interaction of control and measuring devices
by: Alexey Yu. Nesterenko, et al.
Published: (2020-12-01) -
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
by: Nadezhda S. Mogilevskaya
Published: (2018-07-01)