Experiments and hardware countermeasures on power analysis attacks

7Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security is a concern in the design of smartcards. It is possible to leak much side channel information related to secret key when cryptographic algorithm runs on smartcards. Power analysis attacks are a very strong cryptanalysis by monitoring and analyzing power consumption traces. In this paper, we experiment Exclusive OR operation. We also analyze the tendency of state-of-the-art regarding hardware countermeasures and experiments of Hamming-Weights on power attacks. It can be useful to evaluate a cryptosystem related with hardware security technology. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Ahn, M. K., & Lee, H. J. (2006). Experiments and hardware countermeasures on power analysis attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3982 LNCS, pp. 48–53). Springer Verlag. https://doi.org/10.1007/11751595_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free