Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007
DOI: 10.1145/1228784.1228808
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of data dependence of leakage current in CMOS cryptographic hardware

Abstract: A novel power analysis technique for CMOS cryptographic hardware based on leakage power consumption measurements is presented. Algorithms and models to predict the input vector for maximum and minimum leakage current in CMOS gates are reviewed. Extensive transistor level simulations on a simple CMOS crypto core are presented. Leakage current measurements carried out on an ASIC for cryptographic applications implemented in a 0.13 um CMOS technology are reported. The results of this work show that leakage curren… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(25 citation statements)
references
References 10 publications
0
25
0
Order By: Relevance
“…This illustrates the dep current on input patterns. The same observed in PMOS transisto exploited to wage leakage-bas cryptographic systems [3,4,19]. T of LPA will be explained in the nex …”
Section: ) Leakage Power Dependency On Input Pmentioning
confidence: 64%
See 1 more Smart Citation
“…This illustrates the dep current on input patterns. The same observed in PMOS transisto exploited to wage leakage-bas cryptographic systems [3,4,19]. T of LPA will be explained in the nex …”
Section: ) Leakage Power Dependency On Input Pmentioning
confidence: 64%
“…LHPA exploits the correlation between the hamming weight of the input patterns of a circuits and its leakage power to reveal its secret key [2,3,19]. It is easier to wage than LDPA as it needs a fewer number of leakage power measurements.…”
Section: ) Leakage-base Hamming-weight Power Attack (Lhpa)mentioning
confidence: 99%
“…This increasing trend has drawn attention to leakage power which will likely offer a new power related side channel threat. By far the only resources showing results of a successful DPA attack using leakage power consumption are [6] [7]. Further observation can be made by considering the results in [6] and [7].…”
Section: Leakage Power: a New Side Channelmentioning
confidence: 99%
“…The role of leakage power consumption as a side channel has not been addressed until recently in [7] [8]. A conclusive outcome in [7] presented the deterministic result of attack based on minimum leakage current. Feasibility of exploiting the leakage power consumption in side channel attacks was proven in [8].…”
Section: Introductionmentioning
confidence: 99%
“…A. Moradi recently demonstrated successful power-analysis attacks exploiting the static leakage of FPGAs in [28]. Other works also characterized and exploited static leakages of CMOS devices, for example, in [18,26].…”
Section: Temperature Analysismentioning
confidence: 99%