Extracting secret keys from integrated circuits.
Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract secret keys from conditional access systems such as smartcards and ATMs. Arbite...
| Published in: | IEEE Transactions on VLSI systems 13, 10 (2005). |
|---|---|
| Main Author: | |
| Format: | Article |
| Language: | English |
| Subjects: |