The wave dynamic differential logic (WDDL) has been identified as a promising countermeasure to increase the robustness of cryptographic devices against differential power attacks (DPA). However, to guarantee the effectiveness of WDDL technique, the routing in both the direct and complementary paths must be balanced. This paper tackles the problem of unbalance of dual-railsignals in WDDL design. We describe placement techniques suitable for tree-based and mesh-based FPGAs and quantify the gain they confer. Then, we introduce a timing-balance-driven routing algorithm which is architecture independent. Our placement and routing techniques proved to be very promising. In fact, they achieve a gain of 95%, 93%, and 85% in delay balance in tree-b...
n this paper we present the Standard Cell Delay-based Dual-rail Pre-charge Logic (SC-DDPL), a novel ...
As technology advances, the effect of intra-module delays become less significant, while the effect ...
To my wife and family Side-channel attacks are a powerful technique against cryptographic implementa...
International audienceThe wave dynamic differential logic (WDDL) has been identified as a promising ...
International audienceCryptographic devices are vulnerable to Differential Power Attacks (DPA). To r...
International audienceIn this paper, we propose placement and routing techniques to deal with the ti...
This work deals with DPA-resistant logic styles, i.e., celllevel countermeasures against power analy...
Abstract. This work deals with DPA-resistant logic styles, i.e., cell-level countermeasures against ...
Abstract—FPGAs are often considered for high-end applica-tions that require embedded cryptography. T...
Dual Rail Precharge (DRP) circuits, which are theoretically secure against differential power analys...
Abstract. Power-equalization schemes for digital circuits aim to harden cryptographic designs agains...
Field programmable gate arrays (FPGAs) become very pop-ular for embedded cryptographic operations. I...
Side Channel Attacks (SCAs) typically gather unintentional (side channel) physical leakages from run...
International audienceIn this paper, we propose a preprocessing method to improve Side Channel Attac...
ISBN :978-3-540-78609-2International audienceIn this article we discuss dual/multi-rail routing tech...
n this paper we present the Standard Cell Delay-based Dual-rail Pre-charge Logic (SC-DDPL), a novel ...
As technology advances, the effect of intra-module delays become less significant, while the effect ...
To my wife and family Side-channel attacks are a powerful technique against cryptographic implementa...
International audienceThe wave dynamic differential logic (WDDL) has been identified as a promising ...
International audienceCryptographic devices are vulnerable to Differential Power Attacks (DPA). To r...
International audienceIn this paper, we propose placement and routing techniques to deal with the ti...
This work deals with DPA-resistant logic styles, i.e., celllevel countermeasures against power analy...
Abstract. This work deals with DPA-resistant logic styles, i.e., cell-level countermeasures against ...
Abstract—FPGAs are often considered for high-end applica-tions that require embedded cryptography. T...
Dual Rail Precharge (DRP) circuits, which are theoretically secure against differential power analys...
Abstract. Power-equalization schemes for digital circuits aim to harden cryptographic designs agains...
Field programmable gate arrays (FPGAs) become very pop-ular for embedded cryptographic operations. I...
Side Channel Attacks (SCAs) typically gather unintentional (side channel) physical leakages from run...
International audienceIn this paper, we propose a preprocessing method to improve Side Channel Attac...
ISBN :978-3-540-78609-2International audienceIn this article we discuss dual/multi-rail routing tech...
n this paper we present the Standard Cell Delay-based Dual-rail Pre-charge Logic (SC-DDPL), a novel ...
As technology advances, the effect of intra-module delays become less significant, while the effect ...
To my wife and family Side-channel attacks are a powerful technique against cryptographic implementa...