Abstract
Side-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digital systems. These attacks exploit and misuse the information related to the physical behavior of cryptographic devices such as power consumption, emitted electromagnetic radiation, etc. One of the most powerful SCA attacks is known as Power Analysis (PA). It does not require any assumptions regarding the hardware implementation of the cryptographic chip, a complex setup or unique measurement equipment. PA attacks target power supply monitoring, and fall into the category of passive non-invasive...
Original language | American English |
---|---|
Title of host publication | TRUDEVICE 2016 |
State | Published - 2016 |