Updates on the potential of clock-less logics to strengthen cryptographic circuits against side-channel attacks

Cryptographic circuits are subject to sneak attacks that target directly their implementation. So-called side-channel analyses consist in observing dynamic circuit emanations in order to derive information about the secrets it conceals. Clock-less logic styles natively make side-channel attacks difficult, because of the absence of timing references for the algorithm beginning or ending. We present two ways to implement secure clock-less cryptographic circuits. The first one is based on a local synchronization at the gate level, and helps achieving close to constant emanations. The second one is more audacious as it is based merely on removing all synchronization. This approach proves to be very promising in terms of protection against side-channel attacks, while keeping a reasonable overhead both in terms of cost and performance.