摘要 |
<p>The method involves performing non-functional cryptographic operations (11) supplementary to functional cryptographic operations (10) for concealment of the functional cryptographic operations, where the non-functional cryptographic operations are performed while executing instructions for functional cryptographic operations. A frequency ratio between the execution of functional cryptographic operations and the execution of the non-functional cryptographic operations is controlled by adapting a random condition. An independent claim is also included for a device for protecting functional cryptographic operations against side channel attacks, comprising a cryptography unit.</p> |