As of August 2020 the site you are on ( is deprecated, and content is now at


Jump to: navigation, search

Tutorial B7 Profiling Attacks (with HW Assumption)

355 bytes added, 13:18, 29 July 2019
no edit summary
{{Infobox tutorial
|name = B7: Profiling Attacks (with HW Assumption)
|image =
|caption =
|software versions =
|capture hardware = CW-Lite, CW-Lite 2-Part, CW-Pro
|Target Device =
|Target Architecture = XMEGA/Arm/Other
|Hardware Crypto = No
|Purchase Hardware =
This tutorial will demonstrate how to perform a profiling attack against the same AES implementation we've been using. To begin with we'll be using the same Hamming Weight (HW) assumption as previous attacks, although later we'll look into an attack without such assumptions.
Approved_users, administrator

Navigation menu