2019 IEEE International Solid- State Circuits Conference - (ISSCC) 2019
DOI: 10.1109/isscc.2019.8662344
|View full text |Cite
|
Sign up to set email alerts
|

25.3 A 128b AES Engine with Higher Resistance to Power and Electromagnetic Side-Channel Attacks Enabled by a Security-Aware Integrated All-Digital Low-Dropout Regulator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(15 citation statements)
references
References 5 publications
0
15
0
Order By: Relevance
“…Therefore, unlike our proposed ideas, they cannot be applied to various designs, such as single-core processors and cryptographic hardware accelerators. In [23], [44]- [46], DPA-resistant AES cores equipped with various hiding countermeasures were introduced. These countermeasures provide significant improvement in terms of the number of traces required to reveal the secret key.…”
Section: Results Comparisonmentioning
confidence: 99%
“…Therefore, unlike our proposed ideas, they cannot be applied to various designs, such as single-core processors and cryptographic hardware accelerators. In [23], [44]- [46], DPA-resistant AES cores equipped with various hiding countermeasures were introduced. These countermeasures provide significant improvement in terms of the number of traces required to reveal the secret key.…”
Section: Results Comparisonmentioning
confidence: 99%
“…Simple power analysis (SPA) and differential power analysis (DPA) are the frequently-used methods to obtain the cryptographic algorithm power signatures, then lead to the cipher key extractions [ 21 ]. A similar solution also works with electromagnetic emissions [ 22 ] instead of analyzing the power signature; the chip electromagnetic signature is studied like DPA, and the ciphering key is extracted. Indeed, it is not possible to address all the embedded system security issues in one proposition.…”
Section: Preliminariesmentioning
confidence: 99%
“…Typically, filters are found and reported by ad hoc experimentation (trial and error), and parameters are set without any clear selection criterion, or alternatively they are optimized by heuristic methods. For several examples of the large range of band-pass (BP) filters, see [12][13][14], low-pass (LP) filters were recommended in [13,15], high-pass (HP) filters in [16,17] and band-stop (BS) filters [14].…”
Section: We Can Do Better With Ovssamentioning
confidence: 99%
“…For the two, the SCA literature tends to suggest heuristic optimization techniques to pre-process the traces and reduce the noise or filter the raw traces. There are many meta-parameters including the bandwidth and frequency ranges of a filter, its shape, and the domain it is manipulating [12][13][14][15][16][17] (e.g., time, frequency or other domains, such as the wavelet domain [15,18]). Filters are utilized extensively in the field and in particular in the side-channel related literature.…”
Section: Introductionmentioning
confidence: 99%