While side-channel leakage is traditionally evaluated from a fabricated chip, it is more time-efficient and cost-effective to do so during the design phase of the chip. We present Pre-silicon Architecture Correlation Analysis (PACA), a hardware design analysis methodology to help designer locate and mitigate the vulnerabilities in the design at an early design stage. PACA first ranks the individual cells in a design netlist according to their contribution to the estimated side-channel leakage and points out the leaky cells. Next, we further reduce the side-channel leakage by selective replacement of the highest-leaking cells in the design with a side-channel protection version. We demonstrat...
Many internet of things (IoT) devices and integrated circuit (IC) cards have been compromised by sid...
Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices...
Abstract—Early detection of side-channel leakage in the design of a digital crypto-circuit is as imp...
Finding the root cause of power-based side-channel leakage becomes harder when multiple layers of de...
Models and tools developed by the semiconductor community have matured over decades of use. As a res...
Finding the root cause of power-based side-channel leakage becomes harder when multiple layers of de...
Deployment of Dynamic Differential Logics (DDL) appears to be a promising choice for providing resis...
The design of digital systems has its mainstay in the electronic design automation flows which act a...
With the Internet-of-Things revolution, the security assessment against implementation attacks has ...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Exchanging FPGA-based implementations of cryptographic algorithms during run-time using netlist rand...
Modern networks have critical security needs and a suitable level of protection and performance is u...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Over the last few decades, computer-aided engineering (CAE) tools have been developed and improved i...
Many internet of things (IoT) devices and integrated circuit (IC) cards have been compromised by sid...
Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices...
Abstract—Early detection of side-channel leakage in the design of a digital crypto-circuit is as imp...
Finding the root cause of power-based side-channel leakage becomes harder when multiple layers of de...
Models and tools developed by the semiconductor community have matured over decades of use. As a res...
Finding the root cause of power-based side-channel leakage becomes harder when multiple layers of de...
Deployment of Dynamic Differential Logics (DDL) appears to be a promising choice for providing resis...
The design of digital systems has its mainstay in the electronic design automation flows which act a...
With the Internet-of-Things revolution, the security assessment against implementation attacks has ...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Exchanging FPGA-based implementations of cryptographic algorithms during run-time using netlist rand...
Modern networks have critical security needs and a suitable level of protection and performance is u...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Over the last few decades, computer-aided engineering (CAE) tools have been developed and improved i...
Many internet of things (IoT) devices and integrated circuit (IC) cards have been compromised by sid...
Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices...
Abstract—Early detection of side-channel leakage in the design of a digital crypto-circuit is as imp...