This paper describes the PINPAS tool, a tool for the simulation of power analysis and other side-channel attacks on smartcards. The PINPAS tool supports the testing of algorithms for vulnerability to SPA, DPA, etc. at the software level. Exploitation of the PINPAS tool allows for the identification of weaknesses in the implementation in an early stage of development. A toy algorithm is discussed to illustrate the usage of the tool.
|Number of pages||5|
|Publication status||Published - 2003|
|Event||IFIP TC11 18th International Conference on Information Security, SEC 2003 - Athens, Greece|
Duration: 26 May 2003 → 28 May 2003
Conference number: 18
|Other||IFIP TC11 18th International Conference on Information Security, SEC 2003|
|Period||26/05/03 → 28/05/03|