Searched for: contributor%3A%22Picek%2C+S.+%28mentor%29%22
(1 - 1 of 1)
document
Slooff, Tom (author)
One of the most potent attacks against cryptographic implementations nowadays is side-channel attacks. Side-channel attacks use unintended leakages in the implementation, for example, electromagnetic radiation, to retrieve the secret key. Over time side-channel attacks have become more powerful, and recently the community has shifted towards...
master thesis 2021