2011 21st International Conference on Field Programmable Logic and Applications 2011
DOI: 10.1109/fpl.2011.100
|View full text |Cite
|
Sign up to set email alerts
|

Improving Security of SDDL Designs through Interleaved Placement on Xilinx FPGAs

Abstract: Abstract-Implementations of mathematically secure cryptographic algorithms leak information through side channels during run time. Differential Power Analysis (DPA) attacks exploit power leakage to obtain the secret information. Dynamic and Differential Logic (DDL), one of the popular countermeasures against DPA attacks, tries to achieve constant power consumption thereby decorrelating the leakage with the data being processed. Separated Dynamic and Differential Logic (SDDL), a variant of DDL, achieves this go… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…It has the highest efficiency in resource usage, however the starting edge of the evaluation phase swings depending on the input combination. In [13], authors explored place and route techniques for SDDL logic, which keeps identical routing for both rails in interleaved placement, while EPE problem is not solved yet.…”
Section: Previous Work Related With Epe Protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…It has the highest efficiency in resource usage, however the starting edge of the evaluation phase swings depending on the input combination. In [13], authors explored place and route techniques for SDDL logic, which keeps identical routing for both rails in interleaved placement, while EPE problem is not solved yet.…”
Section: Previous Work Related With Epe Protectionmentioning
confidence: 99%
“…Different placement types can be used for an interleaved dual core module. Similar to the work in [13], we investigated several placement types, as shown in Figure 5, due to the merits that type A and B give the smallest distance between complementary instances and nets with high placement density. Comparatively, type C offers a larger space for routing, whereas with lower placement density.…”
Section: Interleaved Placementmentioning
confidence: 99%
“…Thus, the resource for the CLB block will not be used when routing the T part. This technique exclusively reserves the routing resource for the F logic, but it is not automated because the failed nets after 'sanity check [33]' need to be manually corrected. As well, dummy macros also need to be prepared, and implementation to different devices requires starting work from scratch.…”
Section: Identical Routing Techniquesmentioning
confidence: 99%
“…In [33], authors use dummy hard-macros to preoccupy the CLBs that would later be used to place the (F) rails. By this method, all the driver (input) pins and load (output) pins for CLB included in the blocking macro are disabled.…”
Section: Identical Routing Techniquesmentioning
confidence: 99%
“…This is electrically unallowable and triggers error when converting design from xdl to NCD, immediately before bitstream generation. In [87], authors explored a technique to create dummy CLB hard macros, where all driver (Input) pins and load (Output) pins for this CLB are disabled, to block the CLB's occupation by F rail. By this way, the resource for this CLB block will not be used when auto-routing the original T design.…”
Section: Routing Conflictsmentioning
confidence: 99%