A Tutorial on Physical Security and Side-Channel Attacks

  • Koeune F
  • Standaert F
N/ACitations
Citations of this article
89Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A recent branch of cryptography focuses on the physical con-straints that a real-life cryptographic device must face, and attempts to exploit these constraints (running time, power consumption, . . .) to expose the device's secrets. This gave birth to implementation-specific attacks, which often turned out to be much more efficient than the best known cryptanalytic attacks against the underlying primitive as an ide-alized object. This paper aims at providing a tutorial on the subject, overviewing the main kinds of attacks and highlighting their underlying principles.

Cite

CITATION STYLE

APA

Koeune, F., & Standaert, F.-X. (2005). A Tutorial on Physical Security and Side-Channel Attacks (pp. 78–108). https://doi.org/10.1007/11554578_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free