Back to Results
First PageMeta Content
Power analysis / Side channel attack / Timing attack / Tamper resistance / RSA / Differential fault analysis / KeeLoq / Computer security compromised by hardware failure / Cryptography / Espionage / Public-key cryptography


Hardware Attacks on Cryptographic Devices Implementation Attacks on Embedded Systems and Other Portable Hardware Jem Berkes University of Waterloo Prepared for ECE 628, Winter 2006
Add to Reading List

Document Date: 2006-04-11 01:44:56


Open Document

File Size: 210,84 KB

Share Result on Facebook

Company

Embedded Systems / /

Facility

Sale terminal / Other Portable Hardware Jem Berkes University / /

IndustryTerm

device / example wireless device / speed equipment / wireless communications capabilities / test equipment / bank / cryptographic algorithms / faster and cheaper devices / serious energy burden / cryptographic hardware / cryptographic processing / victim hardware / secure algorithms / software toolkit / cryptographic devices / sample wireless device / high energy beams / crypto algorithms / mathematical algorithms / statistical processing / intensive crypto processing / computer hardware technology / endpoint hardware / card reader using standard protocols / exhaustive search / search space / encryption algorithm / computer hardware / search time / exponentiation algorithm / portable hardware / computer equipment / /

Organization

Portable Hardware Jem Berkes University / University of Waterloo / /

Position

designer / /

Technology

radiation / totally secure algorithms / laser / cryptography / computer hardware technology / encryption algorithm / wireless device / wireless communications / cell phones / ATM / private key / secret key / Pay TV / exponentiation algorithm / /

SocialTag