Affiliation
Nanyang Technological University
Banking, defence applications and cryptosystems often demand security features, including cryptography, tamper resistance, stealth, and etc., by means of hardware approaches and/or software approaches to prevent data leakages. The side channel attacks (SCAs) have been employed to extract the secret keys of the encrypted algorithms implemented in hardware devices by analyzing their physical leakage parameters such as power dissipation, electromagnetic interference, timing and acoustic information.