Back to Results
First PageMeta Content
Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard


J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis
Add to Reading List

Document Date: 2011-10-03 19:52:55


Open Document

File Size: 1,16 MB

Share Result on Facebook

City

San Francisco / /

Company

macroscopic SPA / CBC / the AES / P. Rohatgi Cryptography Research Inc / /

Country

United States / /

/

Event

Product Issues / /

Facility

SPA Leaks Fig / /

IndustryTerm

software routine / thermal imaging / target devices / automated tool / noisy systems / cryptographic processing / software developers / tiny single-purpose chips / binary left-to-right algorithm / particular device / target device / larger device / large devices / binary search / cryptographic algorithms / cryptographic devices / symmetric cryptographic algorithms / logic synthesis tools / automated using a simple automated tool to identify / /

Organization

National Security Agency / US government / /

Person

Paul Kocher / Pankaj Rohatgi / Benjamin Jun / Joshua Jaffe / /

Position

Author / candidate for the correct value / cipher designer / analyst / /

Product

computations / /

ProgrammingLanguage

C / /

ProvinceOrState

Manitoba / California / /

Technology

semiconductor / FPGA / radiation / DES encryption / smart card / private key / secret key / encryption / one chip / 128 encryption / public key / A3 algorithm / GSM / symmetric cryptographic algorithms / integrated circuit / /

URL

http /

SocialTag