Abstract—The security threat of side-channel analysis (SCA) attacks has created a need for SCA countermeasures. While many countermeasures have been proposed, a key challenge remains to design a countermeasure that is effective, that is easy to integrate in existing cryptographic implementations, and that has low overhead in area and performance. We present our solution in the context of an embedded design flow for FPGA. We integrate an SCA-resistant custom instruction set on a soft-core CPU. The SCA resistance is based on dual-rail precharge logic. A balanced-interleaved data format, combined with a novel memory organization, ensures that we can support both logic operations as well as lookup tables. The resulting countermeasure applies to...
We demonstrate that masking a block cipher implementation does not sufficiently improve its security...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptograp...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information i...
Abstract—Side-channel analysis (SCA) attacks pose a growing threat to implementations of cryptograph...
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. M...
Abstract. We demonstrate that masking a block cipher implementation does not sufficiently improve it...
Algebraic Side-Channel Attack (ASCA) is a side-channel attack that models the cryptographic algorith...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
We demonstrate that masking a block cipher implementation does not sufficiently improve its security...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptograp...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
Side-Channel Analysis (SCA) and Fault Attacks (FA) are techniques to recover sensitive information i...
Abstract—Side-channel analysis (SCA) attacks pose a growing threat to implementations of cryptograph...
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. M...
Abstract. We demonstrate that masking a block cipher implementation does not sufficiently improve it...
Algebraic Side-Channel Attack (ASCA) is a side-channel attack that models the cryptographic algorith...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
We demonstrate that masking a block cipher implementation does not sufficiently improve its security...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...