2016
DOI: 10.1007/s10836-016-5598-9
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive FPGA-Based Assessment on Fault-Resistant AES against Correlation Power Analysis Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 31 publications
(14 citation statements)
references
References 34 publications
0
12
0
Order By: Relevance
“…Advanced Encryption Standard (AES), also know as Rijndael, is the most popular encryption technique that researches have implemented in FPGAs, with 510 documents. These implementations have been made to increase the encryption speed [406][407][408][409][410], generate small footprint and cheap designs [167,411,412], test the encryption against fault injections/attacks [413,414] and to improve the fault detection/tolerance systems [366,415,416]. Elliptic Curve Cryptography (ECC) is increasingly used in practice to instantiate public-key cryptography protocols, based on the algebraic structure of elliptic curves over finite fields [417].…”
Section: Cryptography Techniquesmentioning
confidence: 99%
“…Advanced Encryption Standard (AES), also know as Rijndael, is the most popular encryption technique that researches have implemented in FPGAs, with 510 documents. These implementations have been made to increase the encryption speed [406][407][408][409][410], generate small footprint and cheap designs [167,411,412], test the encryption against fault injections/attacks [413,414] and to improve the fault detection/tolerance systems [366,415,416]. Elliptic Curve Cryptography (ECC) is increasingly used in practice to instantiate public-key cryptography protocols, based on the algebraic structure of elliptic curves over finite fields [417].…”
Section: Cryptography Techniquesmentioning
confidence: 99%
“…In our work [35], we examined how hardware redundancy affects the crypto module's capability of resisting the power-based side-channel analysis attack. We used the accumulated partial guessing entropy (APGE)-sum of all PGE-as a metric to assess the speed of key retrieval.…”
Section: Information Redundancymentioning
confidence: 99%
“…Furthermore, algorithms can be classified as block and stream cipher algorithms based on the number of bits, and the algorithms can operate simultaneously [6][7][8][9][10]. Generally, these cryptographic algorithms are utilized in different applications such as banking applications, military and government [11], and critical infrastructures such as Smart Grid [12,13].…”
Section: Introductionmentioning
confidence: 99%