The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different countermeasures to thwart these attacks have been proposed and implemented in general, such protections do not make attacks infeasible, but increase the attacker's experimental (data acquisition) and computational (data processing) workload beyond reasonable limits. This paper examines different ways to attack devices featuring random process interrupts and noisy power consumption. © Springer-Verlag Berlin Heidelberg 2000.
CITATION STYLE
Clavier, C., Coron, J. S., & Dabbous, N. (2000). Differential power analysis in the presence of hardware countermeasures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1965 LNCS, pp. 252–263). Springer Verlag. https://doi.org/10.1007/3-540-44499-8_20
Mendeley helps you to discover research relevant for your work.