2009 International Conference on Reconfigurable Computing and FPGAs 2009
DOI: 10.1109/reconfig.2009.50
|View full text |Cite
|
Sign up to set email alerts
|

Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow

Abstract: Abstract-The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customarily employed by malevolent adversaries: observation and perturbation attacks, also called SCA and DFA in the abundant scientific literature on this topic. Numerous research efforts have been carried out to defeat respectively SCA or DFA. However, few publications deal with concomitant protection against both threats. The current consen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3
2

Relationship

5
3

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 25 publications
0
13
0
Order By: Relevance
“…However, it has been noticed that these styles can also natively withstand some perturbation attacks [57], [58], [73], [11]. It has already been underlined in Sec.…”
Section: Dual-rail With Precharge Logic As Amentioning
confidence: 81%
See 2 more Smart Citations
“…However, it has been noticed that these styles can also natively withstand some perturbation attacks [57], [58], [73], [11]. It has already been underlined in Sec.…”
Section: Dual-rail With Precharge Logic As Amentioning
confidence: 81%
“…This property is especially true at the netlist level for logics free from EPE [11]. Indeed, the fanout of each gate is double w.r.t.…”
Section: Revisiting the Comparison Resilience Vs Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, hiding is a countermeasure against most fault injection attacks since the attacker erases the value stored redundantly in one pair of wires by changing only one of them. The case of symmetric faults is covered in [38] and of arbitrary faults in [39]. An interesting noting is that by associating masking and hiding, the protection extends to semi-invasive and invasive attacks.…”
Section: General Picturementioning
confidence: 99%
“…Unfortunately, this logic has never proved to be glitch-free, nor of constant activity (because of unwanted spurious glitches). Some logic-level upgrades of WDDL have also been proposed, amongst which iMDPL [14], DRSL [6], STTL [15,16], SecLib [17], WDDL w/o early evaluation [18], and BCDL [19]. All those styles can be mapped onto an FPGA fabric and are thus concerned with dual-rail balancing.…”
Section: Introductionmentioning
confidence: 99%