Published in

Springer Verlag, Lecture Notes in Computer Science, p. 229-230

DOI: 10.1007/3-540-44499-8_17

Links

Tools

Export citation

Search in Google Scholar

How to Explain Side-Channel Leakage to Your Kids

Proceedings article published in 2000 by David Naccache, Michael Tunstall
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the lay-man. What follows is a presentation of three di erent attacks (power, timing and fault attacks) that can be carried out on cryptographic devices such as smart-cards. For each of the three attacks covered, a puzzle and it`s solution will be given, which will act as an analogy to the attack. How these attacks can be applied to real devices will also be discussed.