Secret keys can be extracted from the power consumption or electromagnetic emanations of unprotected devices. Traditional counter-measures have limited scope of protection, and impose several restrictions on how sensitive data must be manipulated. We demonstrate a bit-serial RISC-V microprocessor implementation with no plain-text data. All values are protected using Boolean masking. Software can run with little to no counter-measures, reducing code size and performance overheads. Unlike previous literature, our methodology is fully automated and can be applied to designs of arbitrary size or complexity. We also provide details on other key components such as clock randomizer, memory protection, and random number generator. The microprocesso...
In recent years it has been demonstrated convincingly that the standby power of a CMOS chip reveals ...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
Small embedded integrated circuits (ICs) such as smart cards are vulnerable to the so-called side-ch...
Secure systems require strong encryption and authentication protocols. Secure systems are used are c...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Side-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digi...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
In the few years since the Raspberry Pi was released in 2012, countless microcomputers based on the ...
We analyze the eciency of the masking of instruction patterns using a chaotic driven clock and power...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
‘Encrypted computing’ is an approach to preventing insider attacks by the privileged operator agains...
In recent years it has been demonstrated convincingly that the standby power of a CMOS chip reveals ...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
Small embedded integrated circuits (ICs) such as smart cards are vulnerable to the so-called side-ch...
Secure systems require strong encryption and authentication protocols. Secure systems are used are c...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Side-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digi...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
In the few years since the Raspberry Pi was released in 2012, countless microcomputers based on the ...
We analyze the eciency of the masking of instruction patterns using a chaotic driven clock and power...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
‘Encrypted computing’ is an approach to preventing insider attacks by the privileged operator agains...
In recent years it has been demonstrated convincingly that the standby power of a CMOS chip reveals ...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
Small embedded integrated circuits (ICs) such as smart cards are vulnerable to the so-called side-ch...