Side-channel attacks have become a significant threat to the integrated circuit security. Circuit level techniques are pro-posed in this paper as a countermeasure against side-channel attacks. A distributed on-chip power delivery system con-sisting of multi-level switched capacitor (SC) voltage con-verters is proposed where the individual interleaved stages are turned on and turned off either based on the workload information or pseudo-randomly to scramble the power con-sumption profile. In the case that the changes in the work-load demand do not trigger the power delivery system to turn on or off individual stages, the active stages are reshuf-fled with so called converter-reshuffling to insert random spikes in the power consumption profil...
Methods and systems are provided for a charge withholding converter reshuffling technique that decor...
Abstract—Two major security challenges for integrated circuits (IC) that involve encryption cores ar...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Abstract—Dynamic power management techniques and related voltage converter architectures are propose...
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret ...
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret ...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Non-invasive side-channel attacks (SCAs) are potent attacks on a cryptographic circuit that can reve...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Non-invasive side-channel attacks (SCAs) are potent attacks on a cryptographic circuit that can reve...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Methods and systems are provided for a charge withholding converter reshuffling technique that decor...
Methods and systems are provided for a charge withholding converter reshuffling technique that decor...
Methods and systems are provided for a charge withholding converter reshuffling technique that decor...
Abstract—Two major security challenges for integrated circuits (IC) that involve encryption cores ar...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Abstract—Dynamic power management techniques and related voltage converter architectures are propose...
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret ...
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret ...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Non-invasive side-channel attacks (SCAs) are potent attacks on a cryptographic circuit that can reve...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Non-invasive side-channel attacks (SCAs) are potent attacks on a cryptographic circuit that can reve...
Dynamic power management techniques and voltage converter architectures are described to provide a s...
Methods and systems are provided for a charge withholding converter reshuffling technique that decor...
Methods and systems are provided for a charge withholding converter reshuffling technique that decor...
Methods and systems are provided for a charge withholding converter reshuffling technique that decor...
Abstract—Two major security challenges for integrated circuits (IC) that involve encryption cores ar...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...