Return to previous page

The DFA/DFT-based hacking techniques and countermeasures: Case study of the 32-bit AES encryption crypto-core