A recent branch of cryptography focuses on the physical con-straints that a real-life cryptographic device must face, and attempts to exploit these constraints (running time, power consumption, . . .) to expose the device's secrets. This gave birth to implementation-specific attacks, which often turned out to be much more efficient than the best known cryptanalytic attacks against the underlying primitive as an ide-alized object. This paper aims at providing a tutorial on the subject, overviewing the main kinds of attacks and highlighting their underlying principles.
CITATION STYLE
Koeune, F., & Standaert, F.-X. (2005). A Tutorial on Physical Security and Side-Channel Attacks (pp. 78–108). https://doi.org/10.1007/11554578_3
Mendeley helps you to discover research relevant for your work.