Proceedings of the 51st Annual Design Automation Conference 2014
DOI: 10.1145/2593069.2593077
|View full text |Cite
|
Sign up to set email alerts
|

A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…In order to resist primary leaks and make SCA more challenging, one strategy is hiding and masking [181,215,216]. Camurati et al [181] demonstrated that the physical separation of analogue and digital components or the use of a separate processor for cryptographic operations are two alternative methods for preventing information from leaking into radio signals.…”
Section: Countermeasuresmentioning
confidence: 99%
“…In order to resist primary leaks and make SCA more challenging, one strategy is hiding and masking [181,215,216]. Camurati et al [181] demonstrated that the physical separation of analogue and digital components or the use of a separate processor for cryptographic operations are two alternative methods for preventing information from leaking into radio signals.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Reconfigurable crypto processor with the metrics of dynamic configuration, high performance is suitable for implementing multiple cipher algorithms by reconfigurable computing technology [6,7]. It allows not only randomly insert dummy operation to change the execution time, but also to randomize the usage of the available hardware resources.…”
Section: Introductionmentioning
confidence: 99%