作者: Catherine H. Gebotys
DOI: 10.1007/978-1-4419-1530-6_8
关键词:
摘要: Design for security not only involves the design of functions which meet price, performance, power, and other constraints, but also resistance to attacks. An attack may be successful in extracting secret key solely from side channel signals recorded a device executing cryptographic algorithm. In many cases plaintext an encryption algorithm additionally required by attacker (known attack) or have controlled (chosen attack). some knowledge ciphertext (ciphertext along with sufficient attack. This chapter will introduce following discuss techniques.