2021
DOI: 10.1016/j.micpro.2021.104311
|View full text |Cite
|
Sign up to set email alerts
|

High-level synthesis, cryptography, and side-channel countermeasures: A comprehensive evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…When we design masked AES circuits and consider security, a better performing circuit provides higher side-channel attack resistance. Additionally, in this study, the masked AES circuits do not possess sufficient security features, which is different from the observations in previous work such as [23]- [25]. One reason for this is that our evaluation is based on simulation.…”
Section: Evaluation Of Aes Circuits Without Maskingmentioning
confidence: 59%
See 1 more Smart Citation
“…When we design masked AES circuits and consider security, a better performing circuit provides higher side-channel attack resistance. Additionally, in this study, the masked AES circuits do not possess sufficient security features, which is different from the observations in previous work such as [23]- [25]. One reason for this is that our evaluation is based on simulation.…”
Section: Evaluation Of Aes Circuits Without Maskingmentioning
confidence: 59%
“…Blömer et al [24] showed that there may be a weakly masking countermeasure. However, the masked program [23] quoted in this paper was guaranteed to be secure in [25]. The algorithm of AES without masking countermeasure is shown in Figure 2.…”
Section: Figure 1 Experimental Flow Thai Is Circuit Design Power Anal...mentioning
confidence: 99%
“…Additionally, we selected block ciphers, AES(-v1), PRESENT and Serpent from [7] as benchmarks. We also selected the open-source AES(-v2) from the Vitis Library [14].…”
Section: A Benchmarksmentioning
confidence: 99%
“…Thus, we propose to use static analysis to detect weaknesses in HLS-generated RTL and an automated repair flow to correct detected weaknesses by generating HLS directives that enable changes to the RTL without modifying the high-level code. We evaluate our work on synthetic benchmarks that highlight how similar high-level patterns can yield different RTL designs and conduct a case study analyzing three block ciphers (AES, serpent, and PRESENT from [7]) to explore the weaknesses that can be introduced by a commercial HLS tool. We show that we can detect these weaknesses automatically and provide fixes to the designers.…”
Section: Introductionmentioning
confidence: 99%