Searched for: contributor%3A%22Van+Leuken%2C+T.G.R.M.+%28mentor%29%22
(1 - 1 of 1)
document
Tamerus, P.D. (author)
Cryptographic devices are vulnerable to so-called Side Channel Attacks. As attackers become smarter, hardware designers and chip manufacturers need to keep up with the security demands against these Side Channel Attacks. Side Channel Attacks such as timing analysis, power consumption analysis or electromagnetic analysis, are based upon the...
master thesis 2012