2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2019
DOI: 10.1109/isvlsi.2019.00064
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Microarchitectural Randomization in Serialized AES Implementations to Mitigate Side Channel Susceptibility

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Some examples include randomly multiplexing two different S-Boxes [18], adjusting processvoltage-temperature (PVT) parameters (e.g. via Dynamic Voltage Frequency Scaling -DVFS) [19], injecting noises [20], controlling the flow of data [21], etc. On the other hand, the Fig.…”
Section: A Sca Hiding Countermeasuresmentioning
confidence: 99%
“…Some examples include randomly multiplexing two different S-Boxes [18], adjusting processvoltage-temperature (PVT) parameters (e.g. via Dynamic Voltage Frequency Scaling -DVFS) [19], injecting noises [20], controlling the flow of data [21], etc. On the other hand, the Fig.…”
Section: A Sca Hiding Countermeasuresmentioning
confidence: 99%
“…Horizontal-hiding increases the SCA resistance of the cryptographic devices by randomizing the execution of the cryptographic operations, as SCA requires the PLIs to be highly aligned to perform key extraction effectively. Various horizontal-hiding countermeasures had been reported since the discovery of SCA, including state-shift clock [14], random shuffling of operations [39], Globally Asynchronous Locally Synchronous (GALS) [15] design, and asynchronous-logic (async-logic) design [16]. Async-logic designs are self-timed circuits that do not rely on a global clock signal to control the circuits' operations.…”
Section: Horizontal-hidingmentioning
confidence: 99%
“…controlling the data flow [39], and so on. On the contrary, uniformization seeks to obscure adversaries by generating analogous leakage patterns from one encryption to the next.…”
Section: A Sca Hiding Countermeasuresmentioning
confidence: 99%