Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level
暂无分享,去创建一个
[1] Danfeng Zhang,et al. Language-based control and mitigation of timing channels , 2012, PLDI.
[2] Christof Paar,et al. A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[3] P. Rohatgi,et al. Test Vector Leakage Assessment ( TVLA ) methodology in practice , 2013 .
[4] Thomas Eisenbarth,et al. Correlation-Enhanced Power Analysis Collision Attack , 2010, CHES.
[5] Vincent Rijmen,et al. A Side-Channel Analysis Resistant Description of the AES S-Box , 2005, FSE.
[6] V. Kamakoti,et al. Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection , 2019, 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[7] Johann Großschädl,et al. Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors , 2018, IACR Cryptol. ePrint Arch..
[8] Stefan Mangard,et al. Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints , 2005, CHES.
[9] Stefan Mangard,et al. Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations , 2006, CHES.
[10] Patrick Schaumont,et al. Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects , 2009, ISA.
[11] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[12] Johannes Blömer,et al. Provably Secure Masking of AES , 2004, IACR Cryptol. ePrint Arch..
[13] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[14] Kyung-Hee Lee,et al. Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results , 2004, AES Conference.
[15] Zhimin Chen,et al. Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage , 2006, CHES.
[16] Amir Moradi,et al. Side-Channel Leakage through Static Power - Should We Care about in Practice? , 2014, CHES.
[17] Megan Wachs,et al. Gate-Level Masking under a Path-Based Leakage Metric , 2014, CHES.
[18] Thomas Zefferer,et al. Evaluation of the Masked Logic Style MDPL on a Prototype Chip , 2007, CHES.
[19] Nicolas Debande,et al. Profiled Model Based Power Simulator for Side Channel Evaluation , 2012, IACR Cryptol. ePrint Arch..
[20] Vincent Rijmen,et al. Threshold Implementations Against Side-Channel Attacks and Glitches , 2006, ICICS.
[21] Ryan Kastner,et al. Leveraging Gate-Level Properties to Identify Hardware Timing Channels , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[22] Eric Peeters,et al. Power and electromagnetic analysis: Improved model, consequences and comparisons , 2007, Integr..
[23] Bilgiday Yuce,et al. A Secure Exception Mode for Fault-Attack-Resistant Processing , 2019, IEEE Transactions on Dependable and Secure Computing.
[24] Mark Mohammad Tehranipoor,et al. RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level , 2019, 2019 IEEE 37th VLSI Test Symposium (VTS).
[25] Stefan Mangard,et al. Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.
[26] Patrick Schaumont,et al. Verification of Power-based Side-channel Leakage through Simulation , 2020, 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS).
[27] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[28] Stéphane Badel,et al. A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies , 2007, 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation.
[29] Ingrid Verbauwhede,et al. Towards Efficient and Automated Side Channel Evaluations at Design Time , 2018, PROOFS@CHES.
[30] Rahul Bodduna,et al. PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance , 2020, 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).