In order to provide security for sensitive data on smart cards and embedded systems cryptographic algorithms are used. Unfortunately, even if such an algorithm has been evaluated in a mathematical model, the realization might leak information due to physical aspects of its implementation. Methods that use these aspects are called implementation attacks. They range from side-channel analysis, which exploit unintentionally leaking information during a critical operation, to fault attacks, which try to manipulate the behavior of a device.
|Effective start/end date||1/03/10 → 30/11/12|