Abstract
For the discussion of power analysis attacks and countermeasures, it is helpful to have some basic knowledge about cryptographic devices. In particular, it is helpful to have a basic understanding of how they are built. This chapter provides this information in compact form. It is intended for readers without a background in hardware design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Cryptographic Devices. In: Power Analysis Attacks. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-38162-6_2
Download citation
DOI: https://doi.org/10.1007/978-0-387-38162-6_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30857-9
Online ISBN: 978-0-387-38162-6
eBook Packages: Computer ScienceComputer Science (R0)