What is it about?

This paper introdues the ideaa to use all of the candidate correlation curves of the CPA attack method to decide to the the correct key value.

Featured Image

Read the Original

This page is a summary of: Correlation template matching CPA method, Electronics Letters, July 2016, the Institution of Engineering and Technology (the IET),
DOI: 10.1049/el.2016.0415.
You can read the full text:

Read

Contributors

The following have contributed to this page