November 24, 2006
Crypto-Gram: June 15, 1998: "Researchers have generalized these methods to include attacks on a system by measuring power consumption, radiation emissions, and other 'side channels,' and have implemented them against a variety of public-key and symmetric algorithms in 'secure' tokens. Related research has looked at fault analysis: deliberately introducing faults into cryptographic processors in order to determine the secret keys. The effects of this attack can be devastating."
source
This entry was posted
on November 24, 2006 at 08:44.
You can skip to the end and leave a response.