2014
DOI: 10.1007/978-3-662-44709-3_32
|View full text |Cite
|
Sign up to set email alerts
|

Gate-Level Masking under a Path-Based Leakage Metric

Abstract: Masking is a popular countermeasure against differential power analysis (DPA) and other side-channel attacks. When designing integrated circuits to resist DPA, masking at the logic gate level has the benefit that it can be implemented without consideration of the highlevel function of the circuit. However, the phenomena of glitches and early propagation reduce the effectiveness of many gate-level masking schemes. In this paper we present a new technique for gate-level masking that is free of glitches and early… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(20 citation statements)
references
References 28 publications
0
18
0
Order By: Relevance
“…In the second scenario the input mask is chosen uniformly at random. As done in [5], we use externally applied masking to ensure that no leakage is due to input and output logic. The zero-mask case corresponds to an unprotected implementation and is used to analyze the leakage behavior of the circuit as well as to show that the measurement setup is able to properly capture leakages.…”
Section: Evaluation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In the second scenario the input mask is chosen uniformly at random. As done in [5], we use externally applied masking to ensure that no leakage is due to input and output logic. The zero-mask case corresponds to an unprotected implementation and is used to analyze the leakage behavior of the circuit as well as to show that the measurement setup is able to properly capture leakages.…”
Section: Evaluation Resultsmentioning
confidence: 99%
“…Similarly 1-private logic only promises resistance to one internal signal being probed. We follow the evaluation methodology established by works such as [3], [4], [5], which use Correlation Power Analysis (CPA) [6] and the Correlation Enhanced Collision Analysis (CCA) [7] to analyze their designs for first-order side channel leakage.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…T-test is a statistical method used to judge whether two sample sets come from the same group. It is used to evaluate the power leakage of circuits in Refs [17][18][19]. Compared with power analysis attack, t-test can quantitatively analyze the DPA-resistant ability of circuits, which is more convincing.…”
Section: Leakage Quantificationmentioning
confidence: 99%
“…In order to avoid the leakage of sensitive information, it is essential to carry out research on the CA defense strategy of AES to design a safe and reliable AES circuit. The defense strategy of CA can be divided into two categories [10]: one is to reduce the fluctuation of the power curve to reduce the amount of leaked information [11,12,13,14,15,16]; another method is to destroy the data relevance between the power curve and key by increasing the redundant power consumption or random noise [17,18,19,20,21,22,23]. The technology of Random Delay Insertion (RDI) is proposed to reduce the correlation between the power consumption and intermediate processed data.…”
Section: Introductionmentioning
confidence: 99%