2010
DOI: 10.1109/tcsi.2009.2019411
|View full text |Cite
|
Sign up to set email alerts
|

Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
45
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 97 publications
(48 citation statements)
references
References 13 publications
0
45
0
Order By: Relevance
“…This illustrates the dep current on input patterns. The same observed in PMOS transisto exploited to wage leakage-bas cryptographic systems [3,4,19]. T of LPA will be explained in the nex …”
Section: ) Leakage Power Dependency On Input Pmentioning
confidence: 63%
See 2 more Smart Citations
“…This illustrates the dep current on input patterns. The same observed in PMOS transisto exploited to wage leakage-bas cryptographic systems [3,4,19]. T of LPA will be explained in the nex …”
Section: ) Leakage Power Dependency On Input Pmentioning
confidence: 63%
“…This trend has led to the creation of a novel class of side channels attacks (SCA) on cryptographic circuits, which exploits the dependency of the leakage current of CMOS integrated circuits on their input patterns to deduce the secret key [2], they are called leakage power attacks (LPA). Several types of LPA's have recently been reported to be successful [3,4]. The first is called leakage differential power analysis (LDPA); it is based on the correlation between a set of leakage power measurements and a selection function related to the key.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, when using smaller feature length CMOS technology such as 65 nm technology, leakage power accounts for at least 20% to 30% of the total power consumption [2], [24]- [27]. Therefore, an estimation of the scaled power consumption at 65 nm technology could be expressed by (26) assuming that the leakage power is 20% of the dynamic power. (26) The authors in [18] and [21] proposed 64-QAM MIMO detector design based on the K-Best approach.…”
Section: E Comparison With Previous Workmentioning
confidence: 99%
“…Therefore, an estimation of the scaled power consumption at 65 nm technology could be expressed by (26) assuming that the leakage power is 20% of the dynamic power. (26) The authors in [18] and [21] proposed 64-QAM MIMO detector design based on the K-Best approach. The work in [18] achieves comparable processing throughput with the proposed architecture with less area and power consumption since the proposed scheme contains the additional feature of achieving error-resilience.…”
Section: E Comparison With Previous Workmentioning
confidence: 99%