2010
DOI: 10.1109/tc.2010.104
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics

Abstract: Cryptographic circuits are nowadays subject to attacks that no longer focus on the algorithm but rather on its physical implementation. Attacks exploiting information leaked by the hardware implementation are called side-channel attacks (SCA). Amongst those attacks, the differential power analysis (DPA) established by Paul Kocher et al. in 1998 represents a serious threat for CMOS VLSI implementations. Different countermeasures that aim at reducing the information leaked by the power consumption have been publ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…Applying DPL to the input data and key, the two wires that represent every Boolean variable have a constant toggling rate. Constant power consumption is achieved independent of the data manipulated thus making a DPA attack impossible [12] [13].…”
Section: ) Dual Rail With Precharge Logic Dplmentioning
confidence: 99%
“…Applying DPL to the input data and key, the two wires that represent every Boolean variable have a constant toggling rate. Constant power consumption is achieved independent of the data manipulated thus making a DPA attack impossible [12] [13].…”
Section: ) Dual Rail With Precharge Logic Dplmentioning
confidence: 99%
“…Moreover, there are circuit-level techniques where dual-rail or multi-rail encoding of data are used [23]. They are dedicated to reduce current variations when the loads of all rails are balanced.…”
Section: A 32-bit Lacsl Montgomery Multipliermentioning
confidence: 99%
“…We notice that those alternative "DPL without EPE" logics yield similar performances: DRSL [18] 6 , iMDPL [65], IWDDL [52], STTL [75], [76], SecLib [35], [32], [33], [36], WDDL w/o EPE [11], [12], BCDL [60], [20] and LBDL [89].…”
Section: Cost Estimation Of Fir Versus Traditional Approachesmentioning
confidence: 99%