International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Using Second-Order Power Analysis to Attack DPA Resistant Software

Authors:
Thomas S. Messerges
Download:
DOI: 10.1007/3-540-44499-8_19
Search ePrint
Search Google
Conference: CHES 2000
BibTeX
@inproceedings{ches-2000-725,
  title={Using Second-Order Power Analysis to Attack DPA Resistant Software},
  booktitle={Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={1965},
  pages={238-251},
  doi={10.1007/3-540-44499-8_19},
  author={Thomas S. Messerges},
  year=2000
}