Combinational Power Analysis on Smart Cards

  • Balaji Megarajan
  • Published 2002


Every time information is transmitted from an ATM or any other machine to the host the secret key also accompanies the data. If we can clearly differentiate the transactions occurring each time, then by analyzing the data we can get to the secret key that is being used.The attack will have to be divided into first finding what type of transaction… (More)


5 Figures and Tables

Cite this paper

@inproceedings{Megarajan2002CombinationalPA, title={Combinational Power Analysis on Smart Cards}, author={Balaji Megarajan}, year={2002} }