A simple and low cost platform to perform Power Analysis Attacks

Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so, it varies with time. This leak- age is mainly used to deduce cryptographic keys as well as algorithms by direct observation of power tra...

Full description

Bibliographic Details
Main Author: Carmona, Manuel Bejarano
Format: Others
Language:English
Published: Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap 2012
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811