Back to Results
First PageMeta Content
Power analysis / Computer network security / Evaluation / Leakage / SHA-2 / Computer security / Advanced Encryption Standard / Evaluation approaches / Side channel attack / Electrical engineering / Cryptography / Security


Design and Validation Strategies for Obtaining Assurance in Countermeasures to Power Analysis and Related Attacks Paul Kocher Cryptography Research, Inc. 575 Market Street, 21st Floor
Add to Reading List

Document Date: 2010-09-10 06:35:51


Open Document

File Size: 109,11 KB

Share Result on Facebook

City

San Francisco / /

Company

AES / Cryptography Research Inc. / Related Attacks Paul Kocher Cryptography Research Inc. / /

Country

United States / /

/

Event

FDA Phase / M&A / /

IndustryTerm

secure devices / conventional protocols / power analysis technology / analog signal processing / given product / cryptographic protocols / target device / to reject devices / cryptographic devices / speed software tools / leak-tolerant device / cryptographic device / resistant cryptographic devices / public key algorithms / software development / similar small devices / speed deep-memory analog waveform collection equipment / /

Person

Joshua Ja / Benjamin Jun / /

Position

designer / evaluator / device designer / /

Product

SHA256 / /

ProvinceOrState

Kansas / California / /

Technology

encryption / cryptography / public key / public key algorithms / power analysis technology / smart card / private key / secret key / cryptographic protocols / /

URL

http /

SocialTag