[5579] in cryptography@c2.net mail archive
Re: Power analysis of AES candidates
daemon@ATHENA.MIT.EDU (Eugene Leitl)
Mon Sep 13 17:56:04 1999
From: Eugene Leitl <eugene.leitl@lrz.uni-muenchen.de>
Date: Mon, 13 Sep 1999 10:32:22 -0700 (PDT)
To: Andreas Bogk <andreas@andreas.org>
Cc: Russell Nelson <nelson@crynwr.com>,
"Cryptography@C2. Net" <cryptography@c2.net>
In-Reply-To: <m3d7vqrgjg.fsf@soma.andreas.org>
Why don't you just erase flash when a pressure change (hull breach) is
detected. Using double-walled hull, to look for shortcuts. You can
also couple this to light detection, and whatnot.
Andreas Bogk writes:
> Russell Nelson <nelson@crynwr.com> writes:
>
> > > There's some question about how hard it will be to design
> > > hardware that will be DPA-resistant for different
> > > algorithms.
> > Big on-chip caps. Lithium batteries. Tamper-resistant housings.
[...]