메뉴 건너뛰기




Volumn 3659, Issue , 2005, Pages 383-397

The "backend duplication" method a leakage-proof place-and-route strategy for ASICs

Author keywords

Differential signals; Information leakage; Secured backend

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER AIDED DESIGN; LOGIC GATES; PROGRAM PROCESSORS; ROUTERS; SECURITY OF DATA;

EID: 27244444584     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11545262_28     Document Type: Conference Paper
Times cited : (43)

References (14)
  • 1
    • 84893732023 scopus 로고    scopus 로고
    • A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
    • Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: Proceedings of ESSCIRC'02. (2002) pp 403-406.
    • (2002) Proceedings of ESSCIRC'02 , pp. 403-406
    • Tiri, K.1    Akmal, M.2    Verbauwhede, I.3
  • 2
    • 3042604811 scopus 로고    scopus 로고
    • A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
    • Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: Proceedings of DATE'04. (2004) pp 246-251.
    • (2004) Proceedings of DATE'04 , pp. 246-251
    • Tiri, K.1    Verbauwhede, I.2
  • 5
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Proceedings of CRYPTO'96, Springer
    • Kocher, P., Jaffe, J., Jun, B.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Proceedings of CRYPTO'96. Volume 1109 of LNCS., Springer (1996) pp 104-113.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 6
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis: Leaking secrets
    • Proceedings of CRYPTO'99, Springer
    • Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis: Leaking Secrets. In: Proceedings of CRYPTO'99. Volume 1666 of LNCS., Springer (1999) pp 388-397.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 7
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concrete results
    • Proceedings of CHES'01, Springer
    • Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Proceedings of CHES'01. Volume 2162 of LNCS, Springer (2001) pp 251-261.
    • (2001) LNCS , vol.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 8
    • 35048904617 scopus 로고    scopus 로고
    • Improving the security of dual-rail circuits
    • LNCS, Springer
    • Sokolov, D., Murphy, J., Bystrov, A.: Improving the Security of Dual-Rail Circuits. In: Proceedings of CHES'04. LNCS, Springer (2004) pp 282-297.
    • (2004) Proceedings of CHES'04 , pp. 282-297
    • Sokolov, D.1    Murphy, J.2    Bystrov, A.3
  • 9
    • 84902478964 scopus 로고    scopus 로고
    • Place and route for secure standard cell design
    • Tiri, K., Verbauwhede, I.: Place and Route for Secure Standard Cell Design. In: Proceedings of CARDIS'04. (2004) pp 143-158.
    • (2004) Proceedings of CARDIS'04 , pp. 143-158
    • Tiri, K.1    Verbauwhede, I.2
  • 10
    • 84949520149 scopus 로고    scopus 로고
    • DES and differential power analysis (the "duplication" method)
    • LNCS, Springer
    • Goubin, L., Patarin, J.: DES and Differential Power Analysis (The "Duplication" Method). In: Proceedings of CHES'99. LNCS, Springer (1999) pp 158-172.
    • (1999) Proceedings of CHES'99 , pp. 158-172
    • Goubin, L.1    Patarin, J.2
  • 11
    • 27244441430 scopus 로고    scopus 로고
    • http://www.cadence.com/partners/languages/languages.aspx
    • LEF/DEF parsers: (website) http://openeda.si2.org/projects/lefdef/ or http://www.cadence.com/partners/languages/languages.aspx.
  • 12
    • 35248825993 scopus 로고    scopus 로고
    • Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
    • LNCS, ed.: Proceedings of CHES'03, Springer
    • Tiri, K., Verbauwhede, I.: "Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. In LNCS, ed.: Proceedings of CHES'03. Volume 2779 of LNCS, Springer (2003) pp 125-136.
    • (2003) LNCS , vol.2779 , pp. 125-136
    • Tiri, K.1    Verbauwhede, I.2
  • 14
    • 27244455719 scopus 로고    scopus 로고
    • DPA on quasi delay insensitive asynchronous circuits: Formalization and improvement
    • Munich, Germany
    • Bouesse, G., Renaudin, M., Dumont, S., Germain, F.: DPA on Quasi Delay Insensitive Asynchronous Circuits: Formalization and Improvement. In: Proceedings of DATE'05. (2005) pp 424-429. Munich, Germany.
    • (2005) Proceedings of DATE'05 , pp. 424-429
    • Bouesse, G.1    Renaudin, M.2    Dumont, S.3    Germain, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.