Why don't you just erase flash when a pressure change (hull breach) is detected. Using double-walled hull, to look for shortcuts. You can also couple this to light detection, and whatnot. Andreas Bogk writes: > Russell Nelson <[EMAIL PROTECTED]> writes: > > > > There's some question about how hard it will be to design > > > hardware that will be DPA-resistant for different > > > algorithms. > > Big on-chip caps. Lithium batteries. Tamper-resistant housings. [...]
- Power analysis of AES candidates William Whyte
- Re: Power analysis of AES candidates John Kelsey
- Re: Power analysis of AES candidates Russell Nelson
- Re: Power analysis of AES candidates Andreas Bogk
- Re: Power analysis of AES candidates Eugene Leitl
- Re: Power analysis of AES candidates Arnold Reinhold
- Re: Power analysis of AES candid... Eugene Leitl
- Re: Power analysis of AES candid... John Gilmore
- Re: Power analysis of AES ca... Eugene Leitl
- Re: Power analysis of AES ca... David Honig
- Re: Power analysis of AES ca... Andreas Bogk
- Re: Power analysis of AES ca... Eli Brandt
- Re: Power analysis of AES ca... Eugene Leitl
- Re: Power analysis of AES ca... Eli Brandt
- Re: Power analysis of AES ca... Markus Kuhn