Author:Moabalobelo, Terrence; Nelwamondo, Fulufhelo V; Tsague, HDDate:Sep 2012Since the inception of side channel attacks, research has gone a long way in proving that embedded devices capable of running cryptographic algorithms are highly susceptible to these attacks. These attacks are non-invasive in which an attacker ...Read more