Proceedings of the 31st European Solid-State Circuits Conference, 2005. ESSCIRC 2005.
DOI: 10.1109/esscir.2005.1541646
|View full text |Cite
|
Sign up to set email alerts
|

Improving dpa security by using globally-asynchronous locally-synchronous systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
9
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…GALS based on pausible clocking is very interesting as a system integration technique. Some mature solutions have been developed [6] and practically evaluated [8]. Recently, this solution was also practically applied as a physical layer of one complex NoC system [9].…”
Section: Introductionmentioning
confidence: 99%
“…GALS based on pausible clocking is very interesting as a system integration technique. Some mature solutions have been developed [6] and practically evaluated [8]. Recently, this solution was also practically applied as a physical layer of one complex NoC system [9].…”
Section: Introductionmentioning
confidence: 99%
“…The predominant soft cores that have been adopted as a co-processor for security applications or their internal architecture has been modified to accommodate new instructions for cryptographic algorithms are the LEON2 [22], LEON3 [11,12], Xtensa LX2 [21], Xtensa T1040 [19], and CoreMP7 [7].…”
Section: Comparisonsmentioning
confidence: 99%
“…The asynchrony in [16] has been used just for power reduction and not to mitigate side channel attacks. An example for the use of Globally Asynchronous Locally Synchronous in a cryptographic circuit as side channel attack countermeasure is given by [12]. However, the circuit in [12] is not for a programmable processor but for the implementation of the Advanced Encryption Standard (AES) [6] algorithm only.…”
Section: Introductionmentioning
confidence: 99%
“…Another common protection method is power trace misalignment, such as using a randomized clock [2], [8], [27], inserting random delays [4] and using multiple clock domains [9]. Randomized clock countermeasures use a single system clock which switches at random discrete time instants.…”
mentioning
confidence: 99%
“…Since this countermeasure uses single system clock for all memory elements, the power consumption caused by the memory elements at the clock switches, which usually dominates the overall consumption, is aligned and could be exploited by the attacker. Gürkaynak et al [9] proposed globally-asynchronous locally-synchronous implementation of AES composed of three blocks each having a local clock and a synchronization interface between them. The design is not generic; it is AES-specific and the blocks are hardwired.…”
mentioning
confidence: 99%