Abstract
Differential power analysis (DPA) attacks are the most popular type of power analysis attacks. This is due to the fact that DPA attacks do not require detailed knowledge about the attacked device. Furthermore, they can reveal the secret key of a device even if the recorded power traces are extremely noisy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Differential Power Analysis. In: Power Analysis Attacks. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-38162-6_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-38162-6_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30857-9
Online ISBN: 978-0-387-38162-6
eBook Packages: Computer ScienceComputer Science (R0)