Mahanta, Hridoy Jyoti; Khan, Ajoy Kumar - In: International Journal of Information Security and … 12 (2018) 3, pp. 27-41
This article describes how differential power analysis has laid the foundations of such an attack that has challenged the security of almost all cryptosystems like DES, AES, and RSA. This non-invasive attack first extracts the power consumption details from devices embedded with cryptographic...