Changes

Attacking TEA with CPA

58 bytes added, 18:00, 25 March 2017
no edit summary
* We had to use a lower optimization level so that we could see the power signature from the sensitive attack points. Can we avoid this? Maybe it's possible to use a different sampling method to find more leakage.
* A template attack might be a more powerful way to perform this attack. There are several points that we could create a template for, including the three points that we examined in this attack.
 
 
[[Category:Examples]]
[[Category:Half Baked Tutorials]]
Approved_users, bureaucrat, administrator
1,956
edits