[5579] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Power analysis of AES candidates

daemon@ATHENA.MIT.EDU (Eugene Leitl)
Mon Sep 13 17:56:04 1999

From: Eugene Leitl <eugene.leitl@lrz.uni-muenchen.de>
Date: Mon, 13 Sep 1999 10:32:22 -0700 (PDT)
To: Andreas Bogk <andreas@andreas.org>
Cc: Russell Nelson <nelson@crynwr.com>,
        "Cryptography@C2. Net" <cryptography@c2.net>
In-Reply-To: <m3d7vqrgjg.fsf@soma.andreas.org>


Why don't you just erase flash when a pressure change (hull breach) is
detected. Using double-walled hull, to look for shortcuts.  You can
also couple this to light detection, and whatnot.

Andreas Bogk writes:
 > Russell Nelson <nelson@crynwr.com> writes:
 > 
 > >  > There's some question about how hard it will be to design
 > >  > hardware that will be DPA-resistant for different
 > >  > algorithms.
 > > Big on-chip caps.  Lithium batteries.  Tamper-resistant housings.
[...]


home help back first fref pref prev next nref lref last post