2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2018
DOI: 10.1109/hst.2018.8383906
|View full text |Cite
|
Sign up to set email alerts
|

Energy efficient and side-channel secure hardware architecture for lightweight cipher SIMON

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…have shown that unrolled implementations of 128-bit SIMON (to 6 th degree) improves power side-channel attack resistance. Their CPA attack targeted round 3 output (combinational) with a 1b hamming weight (HW) leakage model but failed to show an attack even with 500K traces, showing inability to extract leakage in time-domain [23]. Author in [12] demonstrated a general Degenerate Grouping Power Attack (DGPA) on different configurations of SIMON and SPECK and showed a successful attack with up to 4 th degree of unrolling (r=4).…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…have shown that unrolled implementations of 128-bit SIMON (to 6 th degree) improves power side-channel attack resistance. Their CPA attack targeted round 3 output (combinational) with a 1b hamming weight (HW) leakage model but failed to show an attack even with 500K traces, showing inability to extract leakage in time-domain [23]. Author in [12] demonstrated a general Degenerate Grouping Power Attack (DGPA) on different configurations of SIMON and SPECK and showed a successful attack with up to 4 th degree of unrolling (r=4).…”
Section: B Related Workmentioning
confidence: 99%
“…al. have shown 6-round unrolled SIMON-128 implementation being resistant to power-side channel attacks with no key recovery possible even with 500K traces [23]. The authors have targeted flop output and shown the infeasibility of modeling power due to increased key dependencies.…”
Section: B Successful Key Recovery With Proposed Leakage Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…But there are optimal countermeasures or modes of operation targeted for lightweight ciphers that lead to acceptable results. Particularly, SIMON with a round unrolled datapath architecture that enhances vulnerability against a power SCA and yet increases throughput and reduces energy per encryption (pJ/encryption), has been presented in [1,2]. Likewise, PRINCE with unrolled architecture implementation with countermeasures against power SCA has also been proposed [3].…”
Section: Introductionmentioning
confidence: 99%