2013
DOI: 10.1109/tim.2013.2259754
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Correlation Power Analysis Resistance and Its Application on Asymmetric Mask Protected Data Encryption Standard Hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…Different from the above two methods, we adopt the most convenient way compatible to the current digital IC EDA design flow, that is, utilizing a special mode of power analysis tool of PrimeTime Power Extension (PTPX) to gain active power traces [8]. This mode is time-based PTPX mode, which is able to reveal the dynamic power traces according to the specific simulation activity during the encryption operation.…”
Section: Eda Evaluation Methods At Design-timementioning
confidence: 99%
See 1 more Smart Citation
“…Different from the above two methods, we adopt the most convenient way compatible to the current digital IC EDA design flow, that is, utilizing a special mode of power analysis tool of PrimeTime Power Extension (PTPX) to gain active power traces [8]. This mode is time-based PTPX mode, which is able to reveal the dynamic power traces according to the specific simulation activity during the encryption operation.…”
Section: Eda Evaluation Methods At Design-timementioning
confidence: 99%
“…In these systems, cryptographic chips [1][2][3][4][5][6][7][8] are the foundation of their security. However, the emergence of side channel attacks (SCAs) has become a serious threat to cryptographic chips.…”
Section: Introductionmentioning
confidence: 99%
“…DPA first proposed by Kocher [20] has been extensively studied in the literature. DPA and its variant CPA [34, 35] is one of the types of PAA that exploit the data‐dependent property of the power consumption of the circuit. DPA uses the difference of means method to predict the key while CPA uses a statistical distinguisher namely Pearson's correlation coefficient (CC) to correlate between the measurements obtained and predictions made.…”
Section: Power Analysis Attacks (Paas)mentioning
confidence: 99%
“…Since the side-channel attack is proposed by Kocher in 1996 [3], numerous attack approaches, including simple power analysis (SPA) [4], differential power analysis (DPA) [5], correlation power analysis (CPA) [6], template attack (TA) [7], etc, have been explored to reveal the sensitive information of the cryptographic implementations. Of all SCAs, DPA and CPA have become the main threat to the confidentiality of cryptographic implementations for its simplicity and effectiveness.…”
Section: Introductionmentioning
confidence: 99%