From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: a309dd2e68e20e0f8f9589e31720ef661c3573392f2d6c5ba3664486a691dcde
Message ID: <199602211940.OAA07616@pipe4.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-02-21 21:54:52 UTC
Raw Date: Thu, 22 Feb 1996 05:54:52 +0800
From: John Young <jya@pipeline.com>
Date: Thu, 22 Feb 1996 05:54:52 +0800
To: cypherpunks@toad.com
Subject: Schneier Attacks
Message-ID: <199602211940.OAA07616@pipe4.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Schneier says in a March SciAm brief on Kocher's timing
attack: "In theory there are other attacks. You can measure
power consumption or heat dissipation of a chip; timing is
just one way."
Return to February 1996
Return to “Mike Tighe <tighe@spectrum.titan.com>”