Skip to main content


Corporate InformationResearch & Development

Show Index


A trick of "cyber crime" that can extract secret information stored in the internal hardware of mobile devices by manipulating information from sources such as cryptographic processing time, power consumption, and electromagnetic radiation when a mobile device processes a digital signature. To deal with the danger of such attacks, when applying cryptographic techniques, it is important to consider not only the security at the algorithm level but also the way of implementing the cryptographic technique.

Previous page

Popular Terms

Recently Added