Security Tackles Smart Card Hackers
March 18, 2006By monitoring standard characteristics such as execution time, power consumption and electromagnetic radiation and then applying statistical analysis techniques, hackers have very quickly extracted security keys from microprocessors, DSP, FPGA and ASIC-based encryption systems.
Source: www.reed-electronics.com