메뉴 건너뛰기




Volumn 37, Issue 9, 2006, Pages 997-1006

Low-swing current mode logic (LSCML): A new logic style for secure and robust smart cards against power analysis attacks

Author keywords

DPA; Power analysis; Secure smart cards; Self timed logic

Indexed keywords

COMPUTER SIMULATION; ELECTRIC POWER UTILIZATION; NETWORKS (CIRCUITS); SECURITY OF DATA;

EID: 33745915554     PISSN: 00262692     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mejo.2006.01.020     Document Type: Article
Times cited : (19)

References (26)
  • 2
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges T.S., Dabbish E.A., and Sloan R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51 5 (2002) 541-552
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 4
    • 84943632039 scopus 로고    scopus 로고
    • P.C. Kocher, Timing attacks on implementations of Diffie-Helleman, RSA, DSS and other systems, in: The Proceedings of CRYPTO'96, Springer, Berlin, 1996, pp. 104-113.
  • 5
    • 78650238574 scopus 로고    scopus 로고
    • J.J. Quisquater, D. Samyde, Electromagnetic analysis (EMA): measures and counter-measures for smart cards, in: The Proceedings of E-Smart 2001, Springer, Berlin, 2001, pp. 200-210.
  • 6
    • 84957079591 scopus 로고    scopus 로고
    • S. Chari, C.S. Julta, J.R. Rao, R. Rohatgi, Towards sound approaches to counteract power analysis attacks, in: Advances in Cryptology-CRYPTO'99, 19th Annual International Cryptology Conference, August 1999, Lecture Notes in Computer Science, vol. 1666, Springer, Berlin, 1999, pp. 398-412.
  • 7
    • 68549099548 scopus 로고    scopus 로고
    • C. Clavier, J.-S. Coron, N. Dabbous, Differential power analysis in the presence of hardware countermeasures, in: Cryptographic Hardware and Embedded Systems-CHES 2000, Lecture Notes in Computer Science, vol. 1965, Springer, Berlin, 2000, pp. 252-263.
  • 8
    • 35248868313 scopus 로고    scopus 로고
    • C. Karlof, D. Wagner, Hidden Markov Model Cryptanalysis, in Cryptographic Hardware and Embedded Systems-CHES 2003, Lecture Notes in Computer Science, vol. 2779, Springer, Berlin, 2003, pp. 17-34.
  • 9
    • 24144459808 scopus 로고    scopus 로고
    • S. Mangard, T. Popp, B.M. Gammel, Side-channel leakage of masked CMOS gates, in: Topics in Cryptology-CT RSA 2005, Lecture Notes in Computer Science, vol. 3376, Springer, Berlin, 2005, pp. 351-365.
  • 11
    • 17644364039 scopus 로고    scopus 로고
    • Design and analysis of dual-rail circuits for security applications
    • Sokolov D., Murphy J., Bystrov A., and Yakovlev A. Design and analysis of dual-rail circuits for security applications. IEEE Trans. Comput. 54 4 (2005) 449-459
    • (2005) IEEE Trans. Comput. , vol.54 , Issue.4 , pp. 449-459
    • Sokolov, D.1    Murphy, J.2    Bystrov, A.3    Yakovlev, A.4
  • 12
    • 77957948240 scopus 로고    scopus 로고
    • S. Moore, R. Anderson, P. Cunningham, R. Mullins, G. Taylor, Improving smart card security using self-timed circuits, Proceedings of the International Symposium on Asynchronous Circuits and Systems (ASYNC), 2002, pp. 211-218.
  • 13
    • 85172435252 scopus 로고    scopus 로고
    • Z. Yu, S. Furber, L. Plana, An investigation into the security of self-timed circuits, Proceedings of the International Symposium on Asynchronous Circuits and Systems (ASYNC), 2003, pp. 206-215.
  • 14
    • 85056962745 scopus 로고    scopus 로고
    • Piguet C. (Ed), CRC Press, Boca Raton, FL
    • In: Piguet C. (Ed). Low-power Electronics Design (2004), CRC Press, Boca Raton, FL
    • (2004) Low-power Electronics Design
  • 15
    • 0028099030 scopus 로고    scopus 로고
    • J. Schutz, A 3.3 V 0.6 μm BiCMOS superscalar microprocessor, ISSCC Dig. Technical Papers, 1994, pp. 202-203.
  • 16
    • 0029710680 scopus 로고    scopus 로고
    • S. Rajgopal, Challenges in low-power microprocessor design, Proceedings of the Ninth International Conference on VLSI Design: VLSI in Mobile Communication, January 1996, pp. 329-330.
  • 17
    • 33745879421 scopus 로고    scopus 로고
    • J.D. Garside, A CMOS VLSI Implementation of an asynchronous Alu, in: Proceedings of the IFIP Conference on Asynchronous Design Methodologies, Manchester, England, March 1993, pp. 181-192.
  • 18
    • 0035275045 scopus 로고    scopus 로고
    • Dynamic current mode logic (DyCML): a new low-power high-performance logic style
    • Allam M.W., and Elmasry M.I. Dynamic current mode logic (DyCML): a new low-power high-performance logic style. IEEE J. Solid-State Circuits 36 3 (2001) 550-558
    • (2001) IEEE J. Solid-State Circuits , vol.36 , Issue.3 , pp. 550-558
    • Allam, M.W.1    Elmasry, M.I.2
  • 19
    • 33745894311 scopus 로고    scopus 로고
    • E. Brier, C. Clavier, Optimal statistical power analysis, IACR e-print archive 2003/152, 2003 〈http://eprint.iacr.org〉.
  • 20
    • 84893732023 scopus 로고    scopus 로고
    • K. Tiri, M. Akmal, I. Verbauwhede, A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards, in: The Proceedings of ESSCIRC 2002, 2002, pp. 403-406.
  • 21
    • 33745913887 scopus 로고    scopus 로고
    • F. Mace, F.-X. Standaert, I. Hassoune, J.-D. Legat, J.-J. Quisquater, A dynamic current mode logic to counteract power analysis attacks, in: The Proceedings of DCIS 2004, 2004, pp. 186-191.
  • 22
    • 33745890561 scopus 로고    scopus 로고
    • P. Barreto, V. Rijmen, The Khazad legacy-level block cipher available from 〈http://paginas.terra.com.br/informatica/paulobarreto/KhazadPage.html〉.
  • 23
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon C.E. Communication theory of secrecy systems. Bell Systems Technical J. 28 (1949) 657-715
    • (1949) Bell Systems Technical J. , vol.28 , pp. 657-715
    • Shannon, C.E.1
  • 24
    • 33646395372 scopus 로고    scopus 로고
    • F. Macé, F.-X. Standaert, J.-J. Quisquater, J.-D. Legat, A design methodology for secured ICs using dynamic current mode logic, 15th International Workshop on Power and Timing Modeling, Optimization and Simulation-PATMOS 2005, Lecture Notes in Computer Science, vol. 3728, Springer, Berlin, 2005, pp. 550-560.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.