Безопасность информационных технологий (May 2014)
vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
Abstract
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would help mastering various implementation-based attacks.