Advertisement

DES and Differential Power Analysis The “Duplication” Method

  • Louis Goubin
  • Jacques Patarin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1717)

Abstract

Paul Kocher recently developped attacks based on the electric consumption of chips that perform cryptographic computations. Among those attacks, the “Differential Power Analysis” (DPA) is probably one of the most impressive and most difficult to avoid.

Keywords

Electric Consumption Cryptographic Algorithm Fundamental Hypothesis Consumption Curve Simple Power Analysis 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to Differential Power Analysis and Related Attacks, 1998. This paper is available at http://www.cryptography.com/dpa/technical/index.html

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Louis Goubin
    • 1
  • Jacques Patarin
    • 1
  1. 1.Bull SmartCards and TerminalsLouveciennes CedexFrance

Personalised recommendations