This paper discusses a novel direction for multicore cryptographic software, namely the use of multicore to protect a design against side-channel attacks. We present a technique which is based on the principle of dual-rail pre-charge, but which can be completely implemented in software. The resulting protected software is called a Virtual Secure Circuit (VSC). Similar to the dual-rail pre-charge technique, a VSC executes as two complementary programs on two identical processor cores. Our key contributions include (1) the analysis of the security properties of a VSC, (2) the construction of a VSC AES prototype on a dual-PowerPC architecture, (3) the demonstration of VSC\u27s protection effectiveness with real side-channel attack experiments....
Hardware implementations of mathematically secure algorithms unintentionally leak side channel infor...
As portable devices become more ubiquitous, data security in these devices is becoming increasingly ...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalys...
Evaluating security vulnerabilities of software implementations at design step is of primary import...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Protecting cryptographic implementations against side-channel attacks is a must to prevent leakage o...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Abstract. Power-equalization schemes for digital circuits aim to harden cryptographic designs agains...
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are c...
International audienceIn this paper, we propose a preprocessing method to improve Side Channel Attac...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
Abstract. Modern cryptographic algorithms are secure against crypt-analysis. However they are implem...
Secure electronic circuits must implement countermeasures against a wide range of attacks. Often, th...
Hardware implementations of mathematically secure algorithms unintentionally leak side channel infor...
As portable devices become more ubiquitous, data security in these devices is becoming increasingly ...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalys...
Evaluating security vulnerabilities of software implementations at design step is of primary import...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
Protecting cryptographic implementations against side-channel attacks is a must to prevent leakage o...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Abstract. Power-equalization schemes for digital circuits aim to harden cryptographic designs agains...
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are c...
International audienceIn this paper, we propose a preprocessing method to improve Side Channel Attac...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
Abstract. Modern cryptographic algorithms are secure against crypt-analysis. However they are implem...
Secure electronic circuits must implement countermeasures against a wide range of attacks. Often, th...
Hardware implementations of mathematically secure algorithms unintentionally leak side channel infor...
As portable devices become more ubiquitous, data security in these devices is becoming increasingly ...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...