Mike Fournigault

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
When a secure component executes sensitive operations, the information carried by the power consumption can be used to recover secret information. Many different techniques have been developped to recover this secret, but only few of them focus on the recovering of the executed code itself. Indeed, the code knowledge acquired through this step of Simple(More)
  • 1