[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
VLSI architecture of S-box with high area efficiency based on composite field arithmetic
YT Teng, WL Chin, DK Chang, PY Chen… - IEEE Access, 2021 - ieeexplore.ieee.org
This work aims at optimizing the hardware implementation of the SubBytes and inverse
SubBytes operations in the advanced encryption standard (AES). To this, the composite field …
SubBytes operations in the advanced encryption standard (AES). To this, the composite field …
Securing AES designs against power analysis attacks: a survey
TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
Design and implementation of a secure RISC-V microprocessor
K Stangherlin, M Sachdev - IEEE Transactions on Very Large …, 2022 - ieeexplore.ieee.org
Secret keys can be extracted from the power consumption or electromagnetic emanations of
unprotected devices. Traditional countermeasures have a limited scope of protection and …
unprotected devices. Traditional countermeasures have a limited scope of protection and …
A time-/frequency-domain side-channel attack resistant AES-128 and RSA-4K crypto-processor in 14-nm CMOS
A side-channel attack (SCA) hardened AES-128 and RSA crypto-processor in 14-nm CMOS
with measured resistance to correlation power/electromagnetic analysis (CPA/CEMA) in …
with measured resistance to correlation power/electromagnetic analysis (CPA/CEMA) in …
A unified NVRAM and TRNG in standard CMOS technology
True Random Number Generator (TRNG) provides the different keys for device
authentication and cryptography. Typically, the TRNG is implemented in a standalone …
authentication and cryptography. Typically, the TRNG is implemented in a standalone …
Systematic Literature Review of EM-SCA Attacks on Encryption
Cryptography is vital for data security, but cryptographic algorithms can still be vulnerable to
side-channel attacks (SCAs), physical assaults exploiting power consumption and EM …
side-channel attacks (SCAs), physical assaults exploiting power consumption and EM …
A 7-Gbps SCA-resistant multiplicative-masked AES engine in Intel 4 CMOS
A multiplicative masked advanced encryption standard (AES)-128/-256 engine with
measured side-channel resistance to correlation power and electromagnetic (EM) attacks in …
measured side-channel resistance to correlation power and electromagnetic (EM) attacks in …
A Unified PUF and Crypto Core Exploiting the Metastability in Latches
Hardware acceleration of cryptography algorithms represents an emerging approach to
obtain benefits in terms of speed and side-channel resistance compared to software …
obtain benefits in terms of speed and side-channel resistance compared to software …
Variability analysis of SBOX with CMOS 45 nm technology
The consistent scaling of metal-oxide-semiconductor field-effect transistor devices lead to
parameter variations which become a significant design challenge for the researchers and …
parameter variations which become a significant design challenge for the researchers and …