Безопасность информационных технологий (May 2014)

vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms

  • Roman Gevorkovich Korkikian,
  • Evgeny Yurievich Rodionov,
  • Alexander Vladimirovich Mamaev

Journal volume & issue
Vol. 21, no. 2

Abstract

Read online

The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would help mastering various implementation-based attacks.

Keywords