We investigate the possibility of using adiabatic logic as a countermeasure against differential power analysis (DPA) style attacks to make use of its energy efficiency. Like other dual-rail logics, adiabatic logic exhibits a current dependence on input data, which makes the system vulnerable to DPA. To resolve this issue, we propose a symmetric adiabatic logic in which the discharge paths are symmetric for data-independent parasitic capacitance, and the charges are shared between the output nodes and between the internal nodes, respective v to prevent the circuit from depending on the previous input data.This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) su...
We propose a balanced Pre-Charge Static Logic (PCSL) circuit style for asynchronous systems, and com...
Differential Power Analysis (DPA) is a powerful side channel attack aiming at recovering secret info...
Differential power analysis (DPA) has become a major concern for system security. To achieve a high ...
We investigate the possibility of using adiabatic logic as a countermeasure against differential pow...
Differential Power Analysis (DPA) is a powerful side channel attack method. Dual Rail Pre-charge Log...
Differential Power Analysis(DPA)is a powerful side channel attack method.Dual Rail Pre-charge Logic ...
On the whole existing secure adiabatic logic designs exhibit variations in current peaks and have as...
In this paper, we propose a novel power analysis attack resilient adiabatic logic which, unlike exis...
Power analysis attacks exploit the existence of "side channels" in implementations of cryptographic ...
Programmable reversible logic is emerging as a prospective logic design style for implementation in ...
A new adiabatic circuit technique called adiabatic differential cascode voltage switch with compleme...
With ever-increasing growth in VLSI technologies the number of gates per chip area is constantly inc...
This thesis tackles the need for ultra-low power operation in power-constrained cryptographic comput...
Low-power circuits and issues associated with them have gained a significant amount of attention in ...
In this paper, we propose Without Charge Sharing Quasi Adiabatic Logic (WCS-QuAL) as a countermeasur...
We propose a balanced Pre-Charge Static Logic (PCSL) circuit style for asynchronous systems, and com...
Differential Power Analysis (DPA) is a powerful side channel attack aiming at recovering secret info...
Differential power analysis (DPA) has become a major concern for system security. To achieve a high ...
We investigate the possibility of using adiabatic logic as a countermeasure against differential pow...
Differential Power Analysis (DPA) is a powerful side channel attack method. Dual Rail Pre-charge Log...
Differential Power Analysis(DPA)is a powerful side channel attack method.Dual Rail Pre-charge Logic ...
On the whole existing secure adiabatic logic designs exhibit variations in current peaks and have as...
In this paper, we propose a novel power analysis attack resilient adiabatic logic which, unlike exis...
Power analysis attacks exploit the existence of "side channels" in implementations of cryptographic ...
Programmable reversible logic is emerging as a prospective logic design style for implementation in ...
A new adiabatic circuit technique called adiabatic differential cascode voltage switch with compleme...
With ever-increasing growth in VLSI technologies the number of gates per chip area is constantly inc...
This thesis tackles the need for ultra-low power operation in power-constrained cryptographic comput...
Low-power circuits and issues associated with them have gained a significant amount of attention in ...
In this paper, we propose Without Charge Sharing Quasi Adiabatic Logic (WCS-QuAL) as a countermeasur...
We propose a balanced Pre-Charge Static Logic (PCSL) circuit style for asynchronous systems, and com...
Differential Power Analysis (DPA) is a powerful side channel attack aiming at recovering secret info...
Differential power analysis (DPA) has become a major concern for system security. To achieve a high ...