2010 International Conference on Reconfigurable Computing and FPGAs 2010
DOI: 10.1109/reconfig.2010.80
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of DPA Resistance of Block RAMs in Cryptographic Implementations on FPGAs

Abstract: Abstract-Security at low cost is an important factor for cryptographic hardware implementations. Unfortunately, the security of cryptographic implementations is threatened by Side Channel Analysis (SCA). SCA attempts to discover the secret key of a device by exploiting implementation characteristics and bypassing the algorithm's mathematical security. Differential Power Analysis (DPA) is a type of SCA, which exploits the device's power consumption characteristics. Several countermeasures to DPA have been propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 19 publications
0
15
0
Order By: Relevance
“…In [2], the authors only analyze architectures that store the S-Boxes in BRAMs, obtaining that about 5000 traces are needed to recover the last round key with a success rate of 80 %. The number of traces reported in [33] is higher (greater than 11,000). This difference may be due to measurement setup differences between these works.…”
Section: Performance Results and Comparisonmentioning
confidence: 85%
See 3 more Smart Citations
“…In [2], the authors only analyze architectures that store the S-Boxes in BRAMs, obtaining that about 5000 traces are needed to recover the last round key with a success rate of 80 %. The number of traces reported in [33] is higher (greater than 11,000). This difference may be due to measurement setup differences between these works.…”
Section: Performance Results and Comparisonmentioning
confidence: 85%
“…The discussion of these results is presented below. AES T-Box-based implementations have been previously attacked using two kinds of side-channel attacks: power analysis techniques and microprocessor cache leakages [20,33].…”
Section: Performance Results and Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…Indeed, they are undoubtedly the resource that leaks the most. Also, the rest of the logic can be advantageously hidden in tables, thereby limiting their side-channel leakage [36]. It is referred to as "tabulated round logic" in Figure 1.…”
Section: Leakage Squeezing For Additive Boolean Maskingmentioning
confidence: 99%