2017 年 14 巻 2 号 p. 20162005
Side-channel attacks have emerged as the nondestructive threats of security vulnerability in cryptographic hardware. This paper provides an overview of the protection techniques with counter ways of utilizing side-channel information leakage for combatting side-channel attacks as well as securing the authenticity of devices against counterfeits or even falsification.