2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) 2016
DOI: 10.1109/iccpct.2016.7530142
|View full text |Cite
|
Sign up to set email alerts
|

CALPAN: Countermeasure against Leakage Power Analysis attack by normalized DDPL

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…In [105], CPA with Hamming distance model (HDM) is conducted on the Sbox box output of triple data encryption standard (3DES) on a 32bit central processing unit smart card and the whole 112 key bits of 3DES are recovered with moderate effort, which is around 80,000 power traces. Pongaliur et al [93] have coined a three-phase attack [87] AES S-box area and power overhead (n-inverters, 2n-NAND gates, n-XOR gates for a n-input S-box circuit) power balanced circuits [77] serpent S-box -50% decrease in PBC value for LDPA compared to CMOS normalised DDPL [78,79] 2 model for SCA in sensor networks and have presented taxonomy of the same. They have proposed a new technique, called process obfuscation, which can be used as a countermeasure for a variety of SCAs on sensor nodes.…”
Section: Sca On Edge Nodesmentioning
confidence: 99%
See 1 more Smart Citation
“…In [105], CPA with Hamming distance model (HDM) is conducted on the Sbox box output of triple data encryption standard (3DES) on a 32bit central processing unit smart card and the whole 112 key bits of 3DES are recovered with moderate effort, which is around 80,000 power traces. Pongaliur et al [93] have coined a three-phase attack [87] AES S-box area and power overhead (n-inverters, 2n-NAND gates, n-XOR gates for a n-input S-box circuit) power balanced circuits [77] serpent S-box -50% decrease in PBC value for LDPA compared to CMOS normalised DDPL [78,79] 2 model for SCA in sensor networks and have presented taxonomy of the same. They have proposed a new technique, called process obfuscation, which can be used as a countermeasure for a variety of SCAs on sensor nodes.…”
Section: Sca On Edge Nodesmentioning
confidence: 99%
“…Normalised DDPL and DDPL with sleep transistors are proposed in [78, 79] to thwart LPA. The functionality is implemented in the pull down network with sleep transistors for efficient power management.…”
Section: Power Analysis Attacks (Paas)mentioning
confidence: 99%
“…In recent years, first potential countermeasures against static power side-channel analysis (SPSCA) have been investigated [18][19][20][21][22][23][24][25][26]. Similar to the early situation in the field of DPA countermeasures, most of these approaches fall into the hiding category [2] and can be split into two major groups, randomization [18,[23][24][25] and equalization [19][20][21][22]26,27]. Randomization approaches aim to reduce the signal-to-noise ratio (SNR) by generating additional noise to bury the signal in (either on-demand or on a constant basis).…”
Section: Introductionmentioning
confidence: 99%
“…The latter are also known as balancing techniques and come in different flavors. Some are based on conventional standard cells [20]; others require custom cell design [22,26,27]. Some are specifically targeting Hamming weight dependencies [19,21]; others attempt to generally reduce the current variations depending on the input [20,22,26,27].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation