Improving the Security of Dual Rail Logic in FPGA Using Controlled Placement and Routing
暂无分享,去创建一个
Zied Marrakchi | Hayder Mrabet | Habib Mehrez | Emna Amouri | H. Mehrez | Z. Marrakchi | H. Mrabet | Emna Amouri
[1] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[2] W. C. Elmore. The Transient Response of Damped Linear Networks with Particular Regard to Wideband Amplifiers , 1948 .
[3] Carl Ebeling,et al. PathFinder: A Negotiation-Based Performance-Driven Router for FPGAs , 1995, Third International ACM Symposium on Field-Programmable Gate Arrays.
[4] John P. Uyemura. Introduction to VLSI Circuits and Systems , 2001 .
[5] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[6] Patrick Schaumont,et al. Secure FPGA circuits using controlled placement and routing , 2007, 2007 5th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[7] Zied Marrakchi,et al. Efficient tree topology for FPGA interconnect network , 2008, ACM Great Lakes Symposium on VLSI.
[8] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[9] Ralph Howard,et al. Data encryption standard , 1987 .
[10] Vaughn Betz,et al. Architecture and CAD for Deep-Submicron FPGAS , 1999, The Springer International Series in Engineering and Computer Science.
[11] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[12] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[13] R. Menicocci,et al. Universal masking on logic gate level , 2004 .
[14] Marrakchi Zied,et al. Efficient tree topology for FPGA interconnect network , 2008, GLSVLSI '08.
[15] Philippe Maurine,et al. Improvement of dual rail logic as a countermeasure against DPA , 2007, 2007 IFIP International Conference on Very Large Scale Integration.
[16] Sylvain Guilley,et al. Place-and-route impact on the security of DPL designs in FPGAs , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[17] William P. Marnane,et al. Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs , 2009, TRETS.
[18] Sylvain Guilley,et al. Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.