Publication | Closed Access
Testing power-analysis attack susceptibility in register-transfer level designs
13
Citations
1
References
2007
Year
Hardware TrojanEngineeringInformation SecuritySide-channel AttackHardware SecurityHardware Security SolutionPower AnalysisCryptanalytic AttackElectrical EngineeringComputer EngineeringLightweight CryptographyComputer ScienceCryptographic DevicesData SecurityCryptographyPower-analysis Attack SusceptibilitySoftware TestingSecurityEarly Design StepsFault Attack
The susceptibility of cryptographic devices to attacks based on power analysis can be both significantly and efficiently tested at early design steps. The results from a real case application show the advantages of the approach.
| Year | Citations | |
|---|---|---|
Page 1
Page 1