As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Tutorial A8 32bit AES

275 bytes added, 13:18, 18 July 2017
Running Attack
== Running Attack ==
 
The attach is ran in the same manner as previous AES attacks, we use the same leakage assumptions as we don't actually care about the T-Table implementation. The resulting output vs. point location will look a little "messier", as shown here:
 
[[File:A8_outputvspoint.png]]
Approved_users, bureaucrat, administrator
1,956
edits

Navigation menu