A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
IACR Cryptology ePrint Archive
This paper describes how the DPA attack with the difference of means method can be used to extract the secret key from both an 8-bit and a 32-bit implementation of AES using the ChipWhisperer Nano. ... The differential power analysis (DPA) attack aims at extracting sensitive information that is processed by the operations in a cryptographic primitive. ... There are three types of power analysis attacks -simple power analysis (SPA) attacks, differential power analysis attacks (DPA), and correlation power analysis (CPA) attacks. ...dblp:journals/iacr/Lathrop20 fatcat:agv7onpdzzhptju2p7subrcns4