Changes

Tutorial A8 32bit AES

275 bytes added, 13:18, 18 July 2017
Running Attack
== Running Attack ==
 
The attach is ran in the same manner as previous AES attacks, we use the same leakage assumptions as we don't actually care about the T-Table implementation. The resulting output vs. point location will look a little "messier", as shown here:
 
[[File:A8_outputvspoint.png]]
Approved_users, bureaucrat, administrator
1,956
edits