摘要 |
<p>An aim of this invention is to eliminate the risks of aggression 'DPA of the n order' attacks, for all n values, of cryptography electronic assemblies or systems with a secret or private key. The process according to this invention concerns a securing process for an electronic system using a cryptographic calculation procedure using a secret key. The process consists of masking intermediate results in input or output of at least one critical function for the said procedure.</p> |