Differential Power Analysis

Differential Power Analysis,10.1007/3-540-48405-1_25,Paul C. Kocher,Joshua Jaffe,Benjamin Jun

Differential Power Analysis   (Citations: 1553)
BibTex | RIS | RefWorks Download
. Cryptosystem designers frequently assume that secrets willbe manipulated in closed, reliable computing environments. Unfortunately,actual computers and microchips leak information about the operationsthey process. This paper examines specific methods for analyzingpower consumption measurements to find secret keys from tamperresistant devices. We also discuss approaches for building cryptosystemsthat can operate securely in existing hardware that leaks information.Keywords:...
Conference: International Crytology Conference - CRYPTO , pp. 388-397, 1999
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
Sort by: