Provided by: Reed Business Information
Since their public appearance in the mid-90s, side-channel attacks have attracted a significant attention within the cryptographic community. Power analysis and electromagnetic analysis are typical examples of successful attacks against trusted cryptographic devices such as smart cards. They have been investigated by numerous research groups and have given rise to various publications. However, among these practical important results, only a few models for the leakages have been proposed and used. In these models, the main difference between power and electromagnetic analysis is assumed to be the fact that the latter allows space localization (i.e. to observe the leakage of only a part of the cryptographic device).