Agenda
Background
Pencil-and-Paper Method
Mapping RAM
Algorithm
Security analysis
Protected Method
Principle
Algorithm
Security Analysis
Performance
Conclusion
Previous slide
Next slide
Back to first slide
View graphic version