skip to main content
10.1145/2179298.2179375acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Security protection on FPGA against differential power analysis attacks

Published: 12 October 2011 Publication History
First page of PDF

Supplementary Material

Supplemental material. (a67-li_slide.pdf)

References

[1]
E. Brier, C. Clavier, and F. Olivier. Correlation power analysis with a leakage model. In Cryptographic Hardware and Embedded Systems, pages 16-29, 2004.
[2]
J. Chen, M. Dubois, and P. Stenstrom. Simwattch: Integrating complete-system and user-level performance and power simulators. Micro, IEEE, 27(4):34-48, 2007.
[3]
C. Clavier, J.-S. Coron, and N. Dabbous. Differential power analysis in the presence of hardware countermeasures. In Cryptographic Hardware and Embedded Systems, pages 252-263, 2000.
[4]
J.-S. Coron. A new DPA countermeasure based on permutation tables. In Security and Cryptography for Networks, pages 278-292, 2008.
[5]
J. Daemen and V. Rijmen. Resistance against implementation attacks: A comparative study of the AES proposals. In Second Advanced Encryption Standard Candidate Conference, pages 122-132, 1999.
[6]
L. Goubin and J. Patarin. DES and differential power analysis the "duplication" method. In Cryptographic Hardware and Embedded Systems, pages 158-172, 1999.
[7]
S. Guilley, L. Sauvage, F. Flament, V.-N. Vong, P. Hoogvorst, and R. Pacalet. Evaluation of power constant dual-rail logics countermeasures against DPA with design time security metrics. IEEE Transactions on Computers, 59(9):1250-1263, September 2010.
[8]
M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge, and R. Brown. Mibench: A free, commercially representative embedded benchmark suite. In IEEE International Workshop on Workload Characterization, 2001. WWC-4, pages 3-14, 2001.
[9]
P. C. Kocher, J. M. Jaffe, and B. C. Jun. Differential power analysis. In Advance in Cryptography - CRYPTO 1999, pages 388-397, 1999.
[10]
S. Mangard, E. Oswald, and T. Popp. Power analysis attacks: revealing the secrets of smart cards. Springer-Verlag, 2007.
[11]
A. Moradi, M. Taghi, M. Shalmani, and M. Salmasizadeh. Dual-rail transition logic: A logic style for counteracting power analysis attacks. Computers and Electrical Engineering, 35(2):359-369, March 2009.
[12]
J. S. Pan, B. L. Guo, and A. Abraham. Resistance DPA of RSA on smartcard. In International Conference on Information Assurance and Security, pages 406-409, 2009.
[13]
M. Qiu and E. H.-M. Sha. Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Transactions on Design Automation of Electronic Systems (TODAES), 14(2):Article 25, 1-30, Mar. 2009 (TODAES 2011 Best Paper Award).

Cited By

View all
  • (2013)Security paradigm of FPGA against Differential Power Analysis attack2013 Annual IEEE India Conference (INDICON)10.1109/INDCON.2013.6725875(1-5)Online publication date: Dec-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '11: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
October 2011
18 pages
ISBN:9781450309455
DOI:10.1145/2179298
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Eurosis: Eurosis
  • Oak Ridge National Laboratory
  • University of Tennessee: University of Tennessee

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

CSIIRW '11
Sponsor:
  • Eurosis
  • University of Tennessee

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Security paradigm of FPGA against Differential Power Analysis attack2013 Annual IEEE India Conference (INDICON)10.1109/INDCON.2013.6725875(1-5)Online publication date: Dec-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media