Many internet of things (IoT) devices and integrated circuit (IC) cards have been compromised by side-channel attacks. Power-analysis attacks, which identify the secret key of a cryptographic circuit by analyzing the power traces, are among the most dangerous side-channel attacks. Gen-erally, there is a trade-off between execution time and circuit area. However, the correlation between security and performance has yet to be determined. In this study, we investigate the cor-relation between side-channel attack resistance and performance (execution time and circuit area) of advanced encryption standard (AES) circuits. Eleven AES circuits with different performances are designed by high-level synthesis and logic synthesis. Of the eleven AES ci...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Modern networks have critical security needs and a suitable level of protection and performance is u...
Modern networks have critical security needs and a suitable level of protection and performance is u...
Abstract. A protection circuit can be added into cryptographic systems to detect both soft errors an...
Abstract. Variability is a central issue in deep submicron technologies, in which it becomes increas...
Variability is a central issue in deep submicron technologies, in which it becomes increasingly diff...
A sound design time evaluation of the security of a digital device is a goal which has attracted a g...
Modern networks have critical security needs and a suitable level of protection and performance is u...
Modern networks have critical security needs and a suitable level of protection and performance is u...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
Security in Internet of Things (IoT) applications is more important than ever. New devices are pushe...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
Traditionally, most cryptographic algorithms were executed on server computers with high computation...
In the recent years the number of interconnected devices involved in our life is rapidly growing. Th...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Modern networks have critical security needs and a suitable level of protection and performance is u...
Modern networks have critical security needs and a suitable level of protection and performance is u...
Abstract. A protection circuit can be added into cryptographic systems to detect both soft errors an...
Abstract. Variability is a central issue in deep submicron technologies, in which it becomes increas...
Variability is a central issue in deep submicron technologies, in which it becomes increasingly diff...
A sound design time evaluation of the security of a digital device is a goal which has attracted a g...
Modern networks have critical security needs and a suitable level of protection and performance is u...
Modern networks have critical security needs and a suitable level of protection and performance is u...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
Security in Internet of Things (IoT) applications is more important than ever. New devices are pushe...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for k...
Traditionally, most cryptographic algorithms were executed on server computers with high computation...
In the recent years the number of interconnected devices involved in our life is rapidly growing. Th...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Modern networks have critical security needs and a suitable level of protection and performance is u...
Modern networks have critical security needs and a suitable level of protection and performance is u...