Back to Results
First PageMeta Content
Side channel attack / FIPS 140-2 / Advanced Encryption Standard / Timing attack / FIPS 140 / Cryptographic hash function / Cryptanalysis / Differential fault analysis / Block cipher / Cryptography / Cryptography standards / Power analysis


Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security TestingÂȘ
Add to Reading List

Document Date: 2005-10-27 03:09:54


Open Document

File Size: 583,77 KB

Share Result on Facebook

Company

EMC / MI5 / GCHQ / the AES / DengGuo Feng State Key Laboratory / /

Continent

Europe / /

Country

United States / China / /

/

Event

Product Issues / /

Facility

National Institute of Standards and Technology / DengGuo Feng State Key Laboratory of Information Security / Institute of Software / /

IndustryTerm

low-end commerce applications / secure embedded systems / network security protocols / secure systems / given processor / cryptographic key management / security protocol / physical devices / software implementations / software modules / cryptographic algorithm / secure and dependable devices / cryptographic-based security systems / potential applications / cryptographic protocols / software implementation / cryptographic systems / individual processing / chip / encoded algorithms / secure cryptographic algorithms / cryptographic algorithms / voice systems / communications systems / cryptographic hardware / encryption algorithms / cryptographic devices / even software construction / computing / trusted computing base / functional protocols / required security services / cryptographic device / cryptographic protocol / appropriate analysis tools / security protocols / micro-chip / telecommunications systems / trusted computing platform / good cryptographic algorithms / security solutions / /

NaturalFeature

Side Channel Attacks Side channel / /

Organization

Chinese Academy of Sciences / Egyptian Embassy in London / National Natural Science Foundation / Institute of Software / National Institute of Standards and Technology / British intelligence / European Commission / /

Person

P. Wright / Paul Kocher / /

Position

scientist / designer / model / the device may resist adversarial attacks / /

Product

Outputs Bob Alice Frequency Error Message Figure / /

ProvinceOrState

Hawaii / /

Technology

radiation / chip design / encryption algorithms / given processor / cryptographic protocol / network security protocols / separate chip / smart card / security protocols / private key / secure cryptographic algorithms / secret key / integrated circuits / same chip / cryptographic algorithm / encryption / running algorithm / cryptography / laser / security protocol / public key / good cryptographic algorithms / cryptographic algorithms / /

SocialTag