An attack that exploits weaknesses in the physical implementation of a cryptographic system, such as power consumption or electromagnetic emissions.
An attack that exploits weaknesses in the physical implementation of a cryptographic system, such as power consumption or electromagnetic emissions.