This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three dierent attacks (power, timing and fault attacks) that can be carried out on cryptographic devices such as smartcards. For each of the three attacks covered, a puzzle and it's solution will be given, which will act as an analogy to the attack. How these attacks can be applied to real devices will also be discussed. © Springer-Verlag Berlin Heidelberg 2000.
CITATION STYLE
Naccache, D., & Tunstall, M. (2000). How to explain side-channel leakage to your kids. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1965 LNCS, pp. 229–230). Springer Verlag. https://doi.org/10.1007/3-540-44499-8_17
Mendeley helps you to discover research relevant for your work.