Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Bijan Fadaeinia"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
In recent research studies, an observable dependency has been found between the static power consumption of a Complementary Metal-Oxide-Semiconductor (CMOS) chip and its internally stored and processed data. For the most part, these studies have focu
Externí odkaz:
https://doaj.org/article/ab851c8e9fff4d14a96ee345ab77bdf8
Publikováno v:
IEEE Access, Vol 9, Pp 90455-90464 (2021)
As an outstanding cell-level countermeasure to defeat power analysis attacks, dual-rail pre-charge logics rely on balanced complementary paths. During the circuit lifetime, the gates undergo unavoidable changes due to the so-called device aging, henc
Externí odkaz:
https://doaj.org/article/e9b211f7b5fc41d0befafee1255d0be6
Publikováno v:
Applied Sciences, Vol 11, Iss 15, p 7143 (2021)
The imbalance of the currents leaked by CMOS standard cells when different logic values are applied to their inputs can be exploited as a side channel to recover the secrets of cryptographic implementations. Traditional side-channel countermeasures,
Externí odkaz:
https://doaj.org/article/b578c282e4c440d2b226df474c9b712d
Autor:
Bijan Fadaeinia, Amir Moradi
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 9:2175-2188
Nowadays there is no doubt on the susceptibility of cryptographic devices to side-channel analysis attacks. During the last decade, integration of corresponding countermeasures into devices which deal with security and privacy of users has become a m
Publikováno v:
IEEE Access, Vol 9, Pp 90455-90464 (2021)
As an outstanding cell-level countermeasure to defeat power analysis attacks, dual-rail pre-charge logics rely on balanced complementary paths. During the circuit lifetime, the gates undergo unavoidable changes due to the so-called device aging, henc
Publikováno v:
2022 23rd International Symposium on Quality Electronic Design (ISQED).
Publikováno v:
Applied Sciences
Volume 11
Issue 15
Applied Sciences, Vol 11, Iss 7143, p 7143 (2021)
Volume 11
Issue 15
Applied Sciences, Vol 11, Iss 7143, p 7143 (2021)
The imbalance of the currents leaked by CMOS standard cells when different logic values are applied to their inputs can be exploited as a side channel to recover the secrets of cryptographic implementations. Traditional side-channel countermeasures,
Publikováno v:
ASP-DAC
Side-channel analysis attacks exploit the physical characteristics of cryptographic chip implementations to extract their embedded secret keys. In particular, Power Analysis (PA) attacks make use of the dependency of the power consumption on the data