Differential power analysis (DPA) has become a major concern for system security. To achieve a high level of security at a low overhead of power and die area, a novel dual-voltage single-rail dynamic logic (DSDL) is proposed in this paper. DSDL reduces the power dissipation, and obtains a balanced power consumption by locking the charge in the internal nodes during evaluation, utilizing the charge sharing mechanism for voltage transfer as well as using two supply voltages and a positive feedback to speed up the evaluation process. A 4bit SBOX of AES algorithm was implemented to verify the security of the proposed logic. The simulation results proved the efficiency of DSDL, which only incurs a significantly smaller overhead in power consumpt...
Abstract—Based on a first order model of the switching current flowing in CMOS cell, an investigatio...
Delay-based Dual-rail Pre-charge Logic (DDPL) is a logic style introduced with the aim of hiding pow...
Cryptography ensures the security of cipher by performing mathematical functions and computations to...
Differential power analysis (DPA) has become a major concern for system security. To achieve a high ...
Differential power analysis (DPA) has become a major system security concern. To achieve high levels...
International audienceDual rail logic is considered as a relevant hardware countermeasure against Di...
Side channel attacks (SCAs) on security devices have become a major concern for system security. Exi...
Differential Power Analysis (DPA) is a powerful side channel attack method. Dual Rail Pre-charge Log...
In the area of secure circuits design and more particularly of (Differential Power Analysis) DPAresi...
International audienceBased on a first order model of the switching current flowing in CMOS cell, an...
Delay-based Dual-rail Pre-charge Logic (DDPL) is a logic style introduced with the aim of hiding pow...
We propose a logic-level DPA countermeasure called Dual-rail Pre-charge circuit with Binary Decision...
Differential Power Analysis(DPA)is a powerful side channel attack method.Dual Rail Pre-charge Logic ...
Abstract. This paper describes a design method to secure encryption algorithms against Differential ...
n this paper we present the Standard Cell Delay-based Dual-rail Pre-charge Logic (SC-DDPL), a novel ...
Abstract—Based on a first order model of the switching current flowing in CMOS cell, an investigatio...
Delay-based Dual-rail Pre-charge Logic (DDPL) is a logic style introduced with the aim of hiding pow...
Cryptography ensures the security of cipher by performing mathematical functions and computations to...
Differential power analysis (DPA) has become a major concern for system security. To achieve a high ...
Differential power analysis (DPA) has become a major system security concern. To achieve high levels...
International audienceDual rail logic is considered as a relevant hardware countermeasure against Di...
Side channel attacks (SCAs) on security devices have become a major concern for system security. Exi...
Differential Power Analysis (DPA) is a powerful side channel attack method. Dual Rail Pre-charge Log...
In the area of secure circuits design and more particularly of (Differential Power Analysis) DPAresi...
International audienceBased on a first order model of the switching current flowing in CMOS cell, an...
Delay-based Dual-rail Pre-charge Logic (DDPL) is a logic style introduced with the aim of hiding pow...
We propose a logic-level DPA countermeasure called Dual-rail Pre-charge circuit with Binary Decision...
Differential Power Analysis(DPA)is a powerful side channel attack method.Dual Rail Pre-charge Logic ...
Abstract. This paper describes a design method to secure encryption algorithms against Differential ...
n this paper we present the Standard Cell Delay-based Dual-rail Pre-charge Logic (SC-DDPL), a novel ...
Abstract—Based on a first order model of the switching current flowing in CMOS cell, an investigatio...
Delay-based Dual-rail Pre-charge Logic (DDPL) is a logic style introduced with the aim of hiding pow...
Cryptography ensures the security of cipher by performing mathematical functions and computations to...