Secret-dependent operations lead to secret extraction through measuring power consumption
Description
Secret-dependent operations lead to secret extraction through measuring power consumptionCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
Attack Vectors
SCA
Power Side-Channel (MITRE EMB3D TID-101)
Defenses
Constant-time/flow implementation