Power analysis of atmel cryptomemory -- recovering keys from secure eeproms
From MaRDI portal
Publication:2889992
DOI10.1007/978-3-642-27954-6_2zbMATH Open1292.94024OpenAlexW2401040455MaRDI QIDQ2889992FDOQ2889992
Authors: Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede
Publication date: 8 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2113.pdf
Recommendations
Cites Work
Cited In (5)
- The fall of a tiny star
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- Uniform first-order threshold implementations
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
This page was built for publication: Power analysis of atmel cryptomemory -- recovering keys from secure eeproms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889992)