Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Document organization
6 Non-Invasive attack methods
7 Associated Security Functions
8 Non-Invasive Attack Test Methods
9 Side-Channel Analysis of Symmetric-Key
Cryptosystems
10 ASCA on Asymmetric Cryptography
11 Non-Invasive attack mitigation pass/fail test
metrics
Annex A (normative) - Requirements for measurement
apparatus
Annex B (informative) - Emerging attacks
Annex C (informative) - Quality criteria for measurement setups
Annex D (informative) - Chosen-input method to accelerate
leakage analysis
Bibliography