A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano
[article]
2020
IACR Cryptology ePrint Archive
This paper describes how the DPA attack with the difference of means method can be used to extract the secret key from both an 8-bit and a 32-bit implementation of AES using the ChipWhisperer Nano. ...
The differential power analysis (DPA) attack aims at extracting sensitive information that is processed by the operations in a cryptographic primitive. ...
There are three types of power analysis attacks -simple power analysis (SPA) attacks, differential power analysis attacks (DPA), and correlation power analysis (CPA) attacks. ...
dblp:journals/iacr/Lathrop20
fatcat:agv7onpdzzhptju2p7subrcns4