Proceedings of the IEEE 2014 Custom Integrated Circuits Conference 2014
DOI: 10.1109/cicc.2014.6946135
|View full text |Cite
|
Sign up to set email alerts
|

Impact of inductive integrated voltage regulator on the power attack vulnerability of encryption engines: A simulation study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…3.6a. The above analysis was published in [86]. It shows that IVR transformations reduce the correlation between the load current signature and the input current signatures, significantly.…”
Section: Correlation Transfer Functionmentioning
confidence: 95%
See 1 more Smart Citation
“…3.6a. The above analysis was published in [86]. It shows that IVR transformations reduce the correlation between the load current signature and the input current signatures, significantly.…”
Section: Correlation Transfer Functionmentioning
confidence: 95%
“…The MTD increased by 16x compared to the baseline design. Although the absolute value of the correlation for the correct key has decreased in an IVR-AES system, the correlation ratio remains high, indicating that calculating absolute correlation value [86] is not enough to ensure attack protection. Therefore, it is important to consider security-aware design strategies to improve robustness.…”
Section: Cpa On Aes Enginementioning
confidence: 99%
“…The third category of protection reduces the power sidechannel leakage information by isolating the supply from the encryption engine. It includes switched capacitor techniques [16], [17], [18] and integrated voltage regulator (IVR) based implementations [19], [20], [21], [22]. The switched capacitor current equalizer module proposed by Tokunaga et al [17] demonstrated Power SCA immunity, however, it resulted in 2 performance degradation and 33% power overhead.…”
Section: Related Workmentioning
confidence: 99%
“…The switched capacitor current equalizer module proposed by Tokunaga et al [17] demonstrated Power SCA immunity, however, it resulted in 2 performance degradation and 33% power overhead. The impact of package parasitic and integrated buck converters on power SCA vulnerability have been analyzed in [11], [19]. Another concept is to degrade the performance of IVR such that supply current has lesser correlation with the AES current.…”
Section: Related Workmentioning
confidence: 99%