2021
DOI: 10.1587/elex.18.20210309
|View full text |Cite
|
Sign up to set email alerts
|

28nm asynchronous area-saving AES processor with high Common and Machine learning side-channel attack resistance

Abstract: An asynchronous Advanced Encryption Standard (AES) cryptographic processor for low-area and side-channel attack (SCA) resistant applications is introduced. To reduce the area and power, two Substituting Byte blocks (S-Boxes) are reused in key expansion and the data encryption module, respectively. To mitigate SCA, we adopt asynchronous dual-rail logic with dual-rail balanced logic and new dual-rail spacer latch. Common and Machine learning (ML) SCA simulations are performed to validate SCA resistance. To the b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…Analog sensors suffer from sensitivity to errors due to PVs and noise, which limits their application. Considering that cryptographic IP is a widely used type of IP to underpin the security foundation of sensitive content protection, memory encryption and network security [24,25,26], hardware Trojan and vulnerability detection and mitigation to third-party cryptographic IPs have not received sufficient attention. Reverse engineering techniques and combinatorial tests have been applied [27].…”
Section: Introductionmentioning
confidence: 99%
“…Analog sensors suffer from sensitivity to errors due to PVs and noise, which limits their application. Considering that cryptographic IP is a widely used type of IP to underpin the security foundation of sensitive content protection, memory encryption and network security [24,25,26], hardware Trojan and vulnerability detection and mitigation to third-party cryptographic IPs have not received sufficient attention. Reverse engineering techniques and combinatorial tests have been applied [27].…”
Section: Introductionmentioning
confidence: 99%