[5595] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Power analysis of AES candidates

daemon@ATHENA.MIT.EDU (David Honig)
Tue Sep 14 19:51:35 1999

Date: Tue, 14 Sep 1999 15:39:18 -0700
To: John Gilmore <gnu@toad.com>, "Cryptography@C2. Net" <cryptography@c2.net>,
        gnu@toad.com
From: David Honig <honig@sprynet.com>
In-Reply-To: <199909142035.NAA09379@toad.com>

At 01:35 PM 9/14/99 -0700, John Gilmore wrote:
>
>What are you guys talking about?  Differential power analysis doesn't

The power analysis thread mutated into a tamper-react thread 
without changing the Subject line.


>> At 10:32 AM -0700 9/13/99, Eugene Leitl wrote:
>> >Why don't you just erase flash when a pressure change (hull breach) is
>
>Arnold Reinhold said:
>> in several places) that would monitor on-chip supply voltage 








  






home help back first fref pref prev next nref lref last post