Design Time Evaluation for Side-Channel Attack Resistant Cryptographic Implementations KU Leuven
Traditionally, most cryptographic algorithms were executed on server computers with high computational power; stored in physically secure locations. Improvements in technology have brought omnipresent embedded devices, which encompass our daily lives. Secure communication using such devices is additionally hindered from two additional aspects. Firstly, the majority of cryptographic algorithms were made for computers with significant processing ...