What is it about?
This paper introdues the ideaa to use all of the candidate correlation curves of the CPA attack method to decide to the the correct key value.
Featured Image
Read the Original
This page is a summary of: Correlation template matching CPA method, Electronics Letters, July 2016, the Institution of Engineering and Technology (the IET),
DOI: 10.1049/el.2016.0415.
You can read the full text:
Contributors
The following have contributed to this page