Implementation of Power Analysis Attack and Countermeasure

碩士 === 輔仁大學 === 電子工程學系 === 98 === Embedded systems such as smart- and sim- cards use cryptographic algorithms to protect information security. The power consumption of executing a cryptographic program is correlated with the secret key and intermediate data. The Differential Power Analysis (DPA) att...

Full description

Bibliographic Details
Main Authors: Yang-Cheng Chuang, 莊揚程
Other Authors: Kuan-Jen Lin
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/34237553960592072646