메뉴 건너뛰기




Volumn E90-A, Issue 1, 2007, Pages 160-168

Random switching logic: A new countermeasure against DPA and second-order DPA at the logic level

Author keywords

CMOS logic circuit; Differential power analysis; Hardware countermeasure; Second order DPA random switching logic; Side channel attacks

Indexed keywords

CMOS INTEGRATED CIRCUITS; DIFFERENTIAL EQUATIONS; FIELD PROGRAMMABLE GATE ARRAYS; LOGIC CIRCUITS; RANDOM PROCESSES; SWITCHING FUNCTIONS;

EID: 33846526735     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/e90-a.1.160     Document Type: Conference Paper
Times cited : (62)

References (16)
  • 1
    • 84939573910 scopus 로고
    • Differential power analysis
    • Crypto'99, Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Crypto'99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
    • (1666) LNCS , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 2
    • 84880293917 scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • CHES'99, Springer-Verlag
    • J.-S. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," CHES'99, LNCS 1717, pp.292-302, Springer-Verlag, 1999.
    • (1717) LNCS , pp. 292-302
    • Coron, J.-S.1
  • 3
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of DES and AES, secure against some attacks
    • CHES, Springer-Verlag
    • M. Akkar and C. Giraud, "An implementation of DES and AES, secure against some attacks," CHES 2001, LNCS 2162, pp.309-318, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2162 , pp. 309-318
    • Akkar, M.1    Giraud, C.2
  • 4
    • 24144437895 scopus 로고    scopus 로고
    • Combinational logic design for AES subbyte transformation on masked data
    • E. Trichina, "Combinational logic design for AES subbyte transformation on masked data," Cryptology ePrint Archive, 2003/236, 2003.
    • (2003) Cryptology ePrint Archive , vol.2003 236
    • Trichina, E.1
  • 5
    • 3042604811 scopus 로고    scopus 로고
    • A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
    • K. Tiri and I. Verbauwhede, "A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation," Proc. Design Automation and Test in Europe Conference, pp.246-251, 2004.
    • (2004) Proc. Design Automation and Test in Europe Conference , pp. 246-251
    • Tiri, K.1    Verbauwhede, I.2
  • 6
    • 85027165359 scopus 로고    scopus 로고
    • An attack on cryptographic hardware design with masking method
    • ISEC2004-57, 2004
    • T. Ichikawa, D. Suzuki, and M. Saeki, "An attack on cryptographic hardware design with masking method," IEICE Technical Report, ISEC2004-57, 2004.
    • IEICE Technical Report
    • Ichikawa, T.1    Suzuki, D.2    Saeki, M.3
  • 7
    • 24144459808 scopus 로고    scopus 로고
    • Side-channel leakage of masked CMOS gates
    • CT-RSA, Springer-Verlag
    • S. Mangard, T. Popp, and B.M. Gammel, "Side-channel leakage of masked CMOS gates," CT-RSA 2005, LNCS 3376, pp.361-365, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3376 , pp. 361-365
    • Mangard, S.1    Popp, T.2    Gammel, B.M.3
  • 8
    • 27244451021 scopus 로고    scopus 로고
    • Successfully attacking mased AES hardware implementation
    • CHES, Springer-Verlag
    • S. Mangard, N. Pramstaller, and E. Oswald, "Successfully attacking mased AES hardware implementation," CHES 2005, LNCS 3659, pp.157-171, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3659 , pp. 157-171
    • Mangard, S.1    Pramstaller, N.2    Oswald, E.3
  • 9
    • 27244445509 scopus 로고    scopus 로고
    • DPA leakage models for CMOS logic circuits
    • CHES, Springer-Verlag
    • D. Suzuki, M. Saeki, and T. Ichikawa, "DPA leakage models for CMOS logic circuits," CHES 2005, LNCS 3659, pp.366-382, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3659 , pp. 366-382
    • Suzuki, D.1    Saeki, M.2    Ichikawa, T.3
  • 10
    • 24144491908 scopus 로고    scopus 로고
    • Provably secure masking of AES
    • Cryptology ePrint Archive, Report 2004/101
    • J. Blömer, J.G. Merchan, and V. Krummel, "Provably secure masking of AES," Cryptology ePrint Archive, Report 2004/101, 2004.
    • (2004)
    • Blömer, J.1    Merchan, J.G.2    Krummel, V.3
  • 11
    • 68549099555 scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • CHES, Springer-Verlag, 2000
    • T.S. Messerges, "Using second-order power analysis to attack DPA resistant software," CHES 2000, LNCS 1965, pp.238-251, Springer-Verlag, 2000.
    • (1965) LNCS , pp. 238-251
    • Messerges, T.S.1
  • 12
    • 35048870686 scopus 로고    scopus 로고
    • Towards efficient second-order power analysis
    • CHES, Springer-Verlag
    • J. Waddle and D. Wagner, "Towards efficient second-order power analysis," CHES 2004, LNCS 3156, pp.1-15, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3156 , pp. 1-15
    • Waddle, J.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.