This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
semi-invasive [2015/04/16 17:46] – mcmaster-guest | semi-invasive [2018/02/25 09:11] – mcmaster | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== Photonic (UV) flash erasure ====== | ||
+ | Flash | ||
====== Non-invasive attacks ====== | ====== Non-invasive attacks ====== | ||
Line 13: | Line 15: | ||
Many systems have expectations that a piece of hardware will complete an operation in so long. For example, hardware may assume that an ADC will always complete within 100 ms. If evens are generated at 200 ms this normally might not be a problem. | Many systems have expectations that a piece of hardware will complete an operation in so long. For example, hardware may assume that an ADC will always complete within 100 ms. If evens are generated at 200 ms this normally might not be a problem. | ||
- | |||
- | ====== References ====== | ||
- | |||
- | * http:// | ||
- | * http:// | ||
- | * Laser fault injection | ||