Abstract
The use of masking schemes to counteract power analysis attacks is popular for several reasons. For instance, masking can be implemented in software on processors without altering their power consumption characteristics. Probably because of their popularity, many researchers have studied the security of masking schemes and their implementations. It has turned out that virtually every masking scheme can be attacked.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Attacks on Masking. In: Power Analysis Attacks. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-38162-6_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-38162-6_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30857-9
Online ISBN: 978-0-387-38162-6
eBook Packages: Computer ScienceComputer Science (R0)
