Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2013 2013
DOI: 10.7873/date.2013.093
|View full text |Cite
|
Sign up to set email alerts
|

An EDA-Friendly Protection Scheme against Side-Channel Attacks

Abstract: Abstract-This paper introduces a generic and automated methodology to protect hardware designs from side-channel attacks in a manner that is fully compatible with commercial standard cell design flows. The paper describes a tool that artificially adds jitter to the clocks of the sequential elements of a cryptographic unit, which increases the non-determinism of signal timing, thereby making the physical device more difficult to attack. Timing constraints are then specified to commercial EDA tools, which restor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…So, during the coding of a block-data, the clock signal is stable, but every encoding run is slightly time shifted compared to the non countermeasured case. This differs from the implementation described in [6], in which the phase shift occurs every clock cycle. This change, compared to the implementation described in [6], has been required due to timing issues found in the synthesis of the particular AES encoder used in the experiments.…”
Section: Countermeasures Under Testmentioning
confidence: 78%
See 3 more Smart Citations
“…So, during the coding of a block-data, the clock signal is stable, but every encoding run is slightly time shifted compared to the non countermeasured case. This differs from the implementation described in [6], in which the phase shift occurs every clock cycle. This change, compared to the implementation described in [6], has been required due to timing issues found in the synthesis of the particular AES encoder used in the experiments.…”
Section: Countermeasures Under Testmentioning
confidence: 78%
“…This differs from the implementation described in [6], in which the phase shift occurs every clock cycle. This change, compared to the implementation described in [6], has been required due to timing issues found in the synthesis of the particular AES encoder used in the experiments. So, the countermeasure actually implemented doesn't is exactly the same, but it can be considered as a variant.…”
Section: Countermeasures Under Testmentioning
confidence: 78%
See 2 more Smart Citations
“…However, none of these works considered the impact of side-channel attacks (SCAs) to the systems. An automated protection technique for embedded cryptographic hardware was proposed in [13] to withstand SCAs. But the potential real-time requirements to the device was not mentioned.…”
Section: Introductionmentioning
confidence: 99%