Computer Science ›› 2007, Vol. 34 ›› Issue (11): 58-61.

Previous Articles     Next Articles

CHEN Kai- Yan, ZHAO Qiang, CHU Jie, DENG Gao-Ming (Dept. of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Based on the principle of DPA and power leakage principle and leakage model of CMOS device, we first complete software simulation experiment, then we implement DPA attacks to DES running on AT89C52. We succeeded to receive 48-bit key of 16 th round at 106

Key words: Side-channel cryptanalysis,DPA,DES

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!