Cryptographic hardware is now widely deployed in everything from pay TV units to cell phones and Smart cards. Smart cards are most often used as cryptographic devices to provide strong authentication of users and to store secret information securely. The compromise of this private data or the hardware which guards it can have disastrous implications including loss of privacy, forged access, or direct monetary theft. These cryptographic devices are easily obtainable and attackers can carry out attacks on the system without directly attacking the mathematics of the algorithms. Even when totally...
Cryptographic hardware is now widely deployed in everything from pay TV units to cell phones and Smart cards. Smart cards are most often used as crypt...