2009 3rd International Conference on Signals, Circuits and Systems (SCS) 2009
DOI: 10.1109/icscs.2009.5412597
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of countermeasure implementations based on Boolean masking to thwart side-channel attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
1
1

Relationship

4
3

Authors

Journals

citations
Cited by 21 publications
(23 citation statements)
references
References 12 publications
0
23
0
Order By: Relevance
“…In this subsection, we compare the EPA attack (this article) to the MIA [8] and VPA [13] attacks. Following the recent advances concerning the comparison of univariate side-channel distinguishers [20], we apply the first-order success rate to assess the performance of the three attacks.…”
Section: Epa Vs Vpa Vs Miamentioning
confidence: 99%
See 1 more Smart Citation
“…In this subsection, we compare the EPA attack (this article) to the MIA [8] and VPA [13] attacks. Following the recent advances concerning the comparison of univariate side-channel distinguishers [20], we apply the first-order success rate to assess the performance of the three attacks.…”
Section: Epa Vs Vpa Vs Miamentioning
confidence: 99%
“…It is carried out on a DES coprocessor which is part of a SoC programmed in an FPGA. This attack is compared with the MIA attack and another successful attack so-called Variance Power Analysis (VPA) based on the variance distinguisher proposed in [13], [20].…”
Section: Introductionmentioning
confidence: 99%
“…The third countermeasure extending the design is a Boolean masking countermeasure as well, but now, it masks the entire data path, as shown in Figure 4 on the right-hand side. In this case study, the secure S-box component S (x) of the embedded countermeasure is based on the USM S-box scheme presented in [14]. We selected this scheme because it is the most generic and may be embedded into a data path featuring any non-linear logic operations.…”
Section: Secure Synthesis Based On Designer-controlled Countermeasurementioning
confidence: 99%
“…We refer to [3] for more information on countermeasures against power analysis attacks. [5] x x Dual-rail-logic [6,7] x x Register pre-charging [8,9] x x Random clock [10] x (x) x TImasking [11,12] x x Boolean masking [13] x x USMmasking [14] x x MDPL [15,16] x x x…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation