A simple and low cost platform to perform Power Analysis Attacks
Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so, it varies with time. This leak- age is mainly used to deduce cryptographic keys as well as algorithms by direct observation of power tra...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap
2012
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811 |