As of August 2020 the site you are on ( is deprecated, and content is now at


Jump to: navigation, search

Tutorial CW305-2 Breaking AES on FPGA

13 bytes added, 18:52, 1 May 2018
no edit summary
Notice how small the correlations are in this data! In the standard XMEGA software AES attack, we saw correlations on the order of 98%; this FPGA attack gave us closer to 10%. Make sure to take a good look at the other output (correlation vs. traces, PGE vs traces, etc) to get a good idea of how much work is required for a successful attack on the Artix target.
== Links ==

Navigation menu