2015
DOI: 10.1145/2629552
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting FPGA Block Memories for Protected Cryptographic Implementations

Abstract: Modern field programmable gate arrays (FPGAs) are power packed with features to facilitate designers. Availability of features like large block memory (BRAM), digital signal processing cores, and embedded CPU makes the design strategy of FPGAs quite different from ASICs. FPGAs are also widely used in security-critical applications where protection against known attacks is of prime importance. We focus on physical attacks that target physical implementations. To design countermeasures against such attacks, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 26 publications
(37 reference statements)
0
4
0
Order By: Relevance
“…Using RLUT, the Sboxes can be easily computed as a function of the tweak and stored on the fly. Similarly, a low-cost masking scheme RSM [4] can also benefit from RLUT to achieve desired rotation albeit at the cost of latency. Thus there exist several applications where customizable Sboxes are needed.…”
Section: Customizable Sboxesmentioning
confidence: 99%
See 1 more Smart Citation
“…Using RLUT, the Sboxes can be easily computed as a function of the tweak and stored on the fly. Similarly, a low-cost masking scheme RSM [4] can also benefit from RLUT to achieve desired rotation albeit at the cost of latency. Thus there exist several applications where customizable Sboxes are needed.…”
Section: Customizable Sboxesmentioning
confidence: 99%
“…In [3], authors show several side-channel countermeasures which could be realized on FPGAs to protect one design. Another work [4] demonstrates the efficient use of block RAMs to implement complex countermeasures like masking and dual-rail logic. DSPs in FPGAs have also been widely used to design public-key cryptographic algorithms like ECC [5,6] and other post-quantum algorithms [7].…”
Section: Introductionmentioning
confidence: 99%
“…It is because of the global synchronisation signal that the memory utilisation is increased by 2" + 2 and not 2 2 ". The cost can be further reduced to 2" + by using certain BRAM features [29].…”
Section: Low Fan-out Bcdlmentioning
confidence: 99%
“…By using a LCD code with dual distance d, encoded circuit can be protected against monovariate SCA of orders 1, 2, to d − 1. And the monovariate SCA of order d is the lowest degree attack to be practical [19].…”
Section: Protection Against Other Physical Attacksmentioning
confidence: 99%