A Methodology for Optimized Design of Secure Differential Logic Gates for DPA Resistant Circuits
暂无分享,去创建一个
Erica Tena-Sánchez | Antonio J. Acosta | Javier Castro-Ramirez | A. Acosta | E. Tena-Sánchez | J. Castro-Ramirez
[1] Ingrid Verbauwhede,et al. Experimental evaluation of Physically Unclonable Functions in 65 nm CMOS , 2012, 2012 Proceedings of the ESSCIRC (ESSCIRC).
[2] Nikil D. Dutt,et al. HDRL: Homogeneous Dual-Rail Logic for DPA Attack Resistive Secure Circuit Design , 2012, IEEE Embedded Systems Letters.
[3] Aditi Vijaykumar. DPA Resistance of Cryptographic Circuits Considering Temperature and Process Variations , 2012 .
[4] Lionel Torres,et al. Evaluating the robustness of secure triple track logic through prototyping , 2008, SBCCI '08.
[5] Sylvain Guilley,et al. BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).
[6] Stefano Gregori,et al. Protection Circuit against Differential Power Analysis Attacks for Smart Cards , 2008, IEEE Transactions on Computers.
[7] Vincent Rijmen,et al. A Side-Channel Analysis Resistant Description of the AES S-Box , 2005, FSE.
[8] Denis Réal,et al. Influence of the temperature on true random number generators , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[9] Jean-Jacques Quisquater,et al. Information Theoretic Evaluation of Side-Channel Resistant Logic Styles , 2007, CHES.
[10] Stefan Mangard,et al. Successfully Attacking Masked AES Hardware Implementations , 2005, CHES.
[11] P. Parra,et al. An improved differential pull-down network logic configuration for DPA resistant circuits , 2010, 2010 International Conference on Microelectronics.
[12] Takeshi Sugawara,et al. Differential power analysis of AES ASIC implementations with various S-box circuits , 2009, 2009 European Conference on Circuit Theory and Design.
[13] Ingrid Verbauwhede,et al. Design method for constant power consumption of differential logic circuits , 2005, Design, Automation and Test in Europe.
[14] Yusuf Leblebici,et al. Low-power current mode logic for improved DPA-resistance in embedded systems , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[15] SuzukiDaisuke,et al. Random Switching Logic , 2007 .
[16] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[17] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[18] Alessandro Trifiletti,et al. Delay-Based Dual-Rail Precharge Logic , 2011, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[19] Ingrid Verbauwhede,et al. A VLSI design flow for secure side-channel attack resistant ICs , 2005, Design, Automation and Test in Europe.
[20] Volkan Kursun,et al. Reversed Temperature-Dependent Propagation Delay Characteristics in Nanometer CMOS Circuits , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.
[21] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[22] Régis Leveugle,et al. Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic , 2006, IEEE Transactions on Computers.
[23] Stefan Mangard,et al. Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.
[24] Denis Flandre,et al. Low-swing current mode logic (LSCML): A new logic style for secure and robust smart cards against power analysis attacks , 2006, Microelectron. J..
[25] Alessandro Trifiletti,et al. A countermeasure against differential power analysis based on random delay insertion , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[26] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[27] Stefan Mangard,et al. Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints , 2005, CHES.
[28] Alessandro Trifiletti,et al. Effectiveness of Leakage Power Analysis Attacks on DPA-Resistant Logic Styles Under Process Variations , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.
[29] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[30] Patrick Schaumont,et al. Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment , 2005, CHES.
[31] Sylvain Guilley,et al. Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics , 2010, IEEE Transactions on Computers.
[32] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[33] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[34] I. Verbauwhede,et al. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards , 2002, Proceedings of the 28th European Solid-State Circuits Conference.
[35] Wayne P. Burleson,et al. Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[36] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[37] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[38] Daisuke Suzuki,et al. Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style , 2006, CHES.
[39] Alessandro Trifiletti,et al. Three-Phase Dual-Rail Pre-charge Logic , 2006, CHES.
[40] Daisuke Suzuki,et al. Random Switching Logic: A Countermeasure against DPA based on Transition Probability , 2004, IACR Cryptol. ePrint Arch..
[41] Patrick Schaumont,et al. Secure FPGA circuits using controlled placement and routing , 2007, 2007 5th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[42] Alessandro Trifiletti,et al. A Flip-Flop for the DPA Resistant Three-Phase Dual-Rail Pre-Charge Logic Family , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[43] M. I. Elmasry,et al. Dynamic current mode logic (DyCML): a new low-power high-performance logic style , 2001, IEEE J. Solid State Circuits.
[44] Y. Hayashi,et al. Analysis of Electromagnetic Information Leakage From Cryptographic Devices With Different Physical Structures , 2013, IEEE Transactions on Electromagnetic Compatibility.
[45] Elena Trichina,et al. Simplified Adaptive Multiplicative Masking for AES , 2002, CHES.
[46] Tim Collins,et al. Secure contactless smartcard ASIC with DPA protection , 2001 .
[47] Hsie-Chia Chang,et al. A Low Overhead DPA Countermeasure Circuit Based on Ring Oscillators , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.
[48] Shruti Kalra,et al. Effect of temperature dependence on performance of Digital CMOS circuit technologies , 2013, 2013 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSC).
[49] Debdeep Mukhopadhyay,et al. Effect of glitches against masked AES S-box implementation and countermeasure , 2009, IET Inf. Secur..
[50] Jingwen Li,et al. A Comprehensive Design Method Based on WDDL and Dynamic Cryptosystem to Resist DPA Attack , 2011, 2011 International Conference on Intelligence Science and Information Engineering.
[51] Travis N. Blalock,et al. An on-chip signal suppression countermeasure to power analysis attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[52] Alessandro Trifiletti,et al. A new dynamic differential logic style as a countermeasure to power analysis attacks , 2008, 2008 15th IEEE International Conference on Electronics, Circuits and Systems.
[53] Ingrid Verbauwhede,et al. A digital design flow for secure integrated circuits , 2006, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[54] Massimo Alioto,et al. A General Power Model of Differential Power Analysis Attacks to Static Logic Circuits , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[55] Alessandro Trifiletti,et al. Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits , 2010, IEEE Transactions on Circuits and Systems I: Regular Papers.
[56] Sylvain Guilley,et al. Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors , 2007, IEEE Design & Test of Computers.
[57] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[58] Chittaranjan A. Mandal,et al. Designing DPA Resistant Circuits Using BDD Architecture and Bottom Pre-charge Logic , 2013, 2013 Euromicro Conference on Digital System Design.
[59] Stefan Mangard,et al. Implementation aspects of the DPA-resistant logic style MDPL , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[60] Christophe Giraud,et al. An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.
[61] Dong Kyue Kim,et al. Symmetric Adiabatic Logic Circuits against Differential Power Analysis , 2010 .
[62] Christof Paar,et al. Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.