Power analysis of atmel cryptomemory -- recovering keys from secure eeproms
From MaRDI portal
Publication:2889992
Cites work
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Linear Slide Attacks on the KeeLoq Block Cipher
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
Cited in
(5)- The fall of a tiny star
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- Uniform first-order threshold implementations
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
This page was built for publication: Power analysis of atmel cryptomemory -- recovering keys from secure eeproms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889992)