11th IEEE International on-Line Testing Symposium 2005
DOI: 10.1109/iolts.2005.56
|View full text |Cite
|
Sign up to set email alerts
|

Power-balanced self checking circuits for cryptographic chips

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Techniques based on balancing power fluctuation include new CMOS logic gates [31][32][33][34][35][36][37][38][39][40][41][42][43][44][45][46], which go through a full charge/discharge cycle for each data processed. Asynchronous circuits, especially dual-rail encoded logic, have been well studied for anti-DPA because of the fixed switching activities during each DATA-Spacer cycle [47][48][49][50][51][52][53][54][55][56][57][58][59][60][61][62][63][64][65]. Other power balancing methods include modifying the algorithm execution [66][67][68][69], compensating current at the power supply node [70][71][72][73], and using subthreshold operation [74].…”
Section: Power-based Attacksmentioning
confidence: 99%
“…Techniques based on balancing power fluctuation include new CMOS logic gates [31][32][33][34][35][36][37][38][39][40][41][42][43][44][45][46], which go through a full charge/discharge cycle for each data processed. Asynchronous circuits, especially dual-rail encoded logic, have been well studied for anti-DPA because of the fixed switching activities during each DATA-Spacer cycle [47][48][49][50][51][52][53][54][55][56][57][58][59][60][61][62][63][64][65]. Other power balancing methods include modifying the algorithm execution [66][67][68][69], compensating current at the power supply node [70][71][72][73], and using subthreshold operation [74].…”
Section: Power-based Attacksmentioning
confidence: 99%