2022
DOI: 10.3390/app12052390
|View full text |Cite
|
Sign up to set email alerts
|

Gate-Level Hardware Countermeasure Comparison against Power Analysis Attacks

Abstract: The fast settlement of privacy and secure operations in the Internet of Things (IoT) is appealing in the selection of mechanisms to achieve a higher level of security at minimum cost and with reasonable performances. All these aspects have been widely considered by the scientific community, but more effort is needed to allow the crypto-designer the selection of the best style for a specific application. In recent years, dozens of proposals have been presented to design circuits resistant to power analysis atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 73 publications
0
3
0
Order By: Relevance
“…In case of detecting an increment in power leakage information, combined DFA and DPA countermeasures can be implemented. In this sense, in the literature a wide range of DPA countermeasures have been proposed that could be compatible with the DFA countermeasures proposed in this paper, as for example the ones focused at gate-level [54].…”
Section: Power Analysis Evaluationmentioning
confidence: 82%
“…In case of detecting an increment in power leakage information, combined DFA and DPA countermeasures can be implemented. In this sense, in the literature a wide range of DPA countermeasures have been proposed that could be compatible with the DFA countermeasures proposed in this paper, as for example the ones focused at gate-level [54].…”
Section: Power Analysis Evaluationmentioning
confidence: 82%
“…That is why the need to include hardware countermeasures to prevent such attacks. For this purpose, there is a wide range of possibilities that, depending on the requirements and limitations of the application, we can choose from and that can best fit our design [14].…”
Section: Case Of Study and Resultsmentioning
confidence: 99%
“…There are various attack techniques that vary greatly in terms of the execution cost and time, equipment needed, and expertise required. These two characteristics can be used to classify them as active or passive and invasive or non-invasive [ 7 , 8 ]. Figure 1 summarizes the attack classification.…”
Section: Introductionmentioning
confidence: 99%