Proceedings of the 42nd Annual Conference on Design Automation - DAC '05 2005
DOI: 10.1145/1065579.1065639
|View full text |Cite
|
Sign up to set email alerts
|

A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing

Abstract: Security ICs are vulnerable to side-channel attacks (SCAs) that find the secret key by monitoring the power consumption and other information that is leaked by the switching behavior of digital CMOS gates. This paper describes a side-channel attack resistant coprocessor IC and its design techniques. The IC has been fabricated in 0.18µm CMOS. The coprocessor, which is used for embedded cryptographic and biometric processing, consists of four components: an Advanced Encryption Standard (AES) based cryptographic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
29
0
1

Year Published

2006
2006
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(30 citation statements)
references
References 8 publications
0
29
0
1
Order By: Relevance
“…As the transistor size and wiring width continuously shrink, it becomes more difficult to apply such techniques. Besides, current results show that these approaches needs area at least 3 times larger than the standard CMOS implementation of an unprotected AES design [14].…”
Section: Introductionmentioning
confidence: 97%
See 3 more Smart Citations
“…As the transistor size and wiring width continuously shrink, it becomes more difficult to apply such techniques. Besides, current results show that these approaches needs area at least 3 times larger than the standard CMOS implementation of an unprotected AES design [14].…”
Section: Introductionmentioning
confidence: 97%
“…The attack, called as Differential Power Analysis (DPA), has been considered as the most dangerous attack to the security of cryptographic embedded systems [9]. A recent report stated that the key of an unprotected AES coprocessor can be found in less than three minutes [14].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Previous work on side channel attacks has studied information leakage from monitors [29], keyboards [6,10,39], consumer mobile devices (such as PDAs, pagers) [18], IC chips [37], smart cards [32], etc. However, no previous work has focussed on preventing side channel attacks on sensor nodes.…”
Section: Introductionmentioning
confidence: 99%