Timeline for Mitigating Side Channel Attack (SCA)
Current License: CC BY-SA 4.0
3 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| May 10, 2018 at 14:53 | comment | added | Kronos | Yes, Actually, leakage can be much easily detected from SW implementation. Because it can only process data by 8-bits or 32-bits, etc based on its CPU type. | |
| May 10, 2018 at 8:49 | comment | added | Evgeni Vaknin | This works also for SW implementation? | |
| May 9, 2018 at 13:03 | history | answered | Kronos | CC BY-SA 4.0 |