Proceedings of the 28th Asia and South Pacific Design Automation Conference 2023
DOI: 10.1145/3566097.3568353
|View full text |Cite
|
Sign up to set email alerts
|

FPGA Based Countermeasures against Side Channel Attacks on Block Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 19 publications
0
0
0
Order By: Relevance
“…Many countermeasures, including masking [13][14][15], shuffling [16][17][18], randomized clock [19,20], random delay insertion [21][22][23], constant-weight encoding [24], and code polymorphism [25,26], are used to lessen side-channel assaults. By preventing information from leaking through physically quantifiable channels like time [27,28], power consump-tion [29,30], or electromagnetic radiation [31,32], these countermeasures seek to safeguard cryptographic systems.…”
Section: Of 13mentioning
confidence: 99%
“…Many countermeasures, including masking [13][14][15], shuffling [16][17][18], randomized clock [19,20], random delay insertion [21][22][23], constant-weight encoding [24], and code polymorphism [25,26], are used to lessen side-channel assaults. By preventing information from leaking through physically quantifiable channels like time [27,28], power consump-tion [29,30], or electromagnetic radiation [31,32], these countermeasures seek to safeguard cryptographic systems.…”
Section: Of 13mentioning
confidence: 99%
“…The system provided in this article combines software and hardware implementation, balancing performance, cost, and security, providing a good idea for subsequent researchers to combine software and hardware. Side-channel attacks are a kind of attack method that targets encryption devices [17]. By analyzing side-channel information of encryption devices during operation, such as time period, power consumption, or electromagnetic radiation, attackers can infer the internal state or key information of encryption devices.…”
Section: Introductionmentioning
confidence: 99%