Hacker News new | past | comments | ask | show | jobs | submit login

The first time I heard about attacks on crypto that monitored processor power consumption, I was pretty skeptical. It seems crazy to me that it could work. But of course it does.

Same thing with timing attacks, til I learned how to code one for myself.

It's funny how very very careful you have to be.




Worth pointing out that you don't need to have an attacker watching your power consumption to have the partial nonce leak problem.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: