2017 Volume 14 Issue 2 Pages 20162005
Side-channel attacks have emerged as the nondestructive threats of security vulnerability in cryptographic hardware. This paper provides an overview of the protection techniques with counter ways of utilizing side-channel information leakage for combatting side-channel attacks as well as securing the authenticity of devices against counterfeits or even falsification.