<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Design for security not only involves the design of security functions which meet price, performance, power, and other constraints, but also resistance to attacks. An attack may be successful in extracting the secret key solely from the side channel signals recorded from a device executing a cryptographic algorithm. In many cases the plaintext of an encryption algorithm additionally may be required by the attacker (known plaintext attack) or may have to be controlled by the attacker (chosen plaintext attack). In some cases the knowledge of the ciphertext (ciphertext attack) along with the side channel signals may be sufficient for an attack. This chapter will introduce the side channel attack and the following chapter will discuss resistance techniques.
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |