2008 IEEE International Symposium on Circuits and Systems 2008
DOI: 10.1109/iscas.2008.4541402
|View full text |Cite
|
Sign up to set email alerts
|

Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Initial works were produced by different authors exploiting mainly the leakage consumption of combinational logic gates with different input vectors [45], [46], [47]. In 2010, Alioto et al [9] observed that sequential logic elements (that is, flip-flops), exhibited distinct leakage current profiles depending on the data they were storing (either a 1 or a 0) and, with that, introduced a power model of leakage power consumption of register arrays depending on intermediate cryptographic variables.…”
Section: Leakage Power Analysis Attacks Countermeasures and Fdsoi Tec...mentioning
confidence: 99%
“…Initial works were produced by different authors exploiting mainly the leakage consumption of combinational logic gates with different input vectors [45], [46], [47]. In 2010, Alioto et al [9] observed that sequential logic elements (that is, flip-flops), exhibited distinct leakage current profiles depending on the data they were storing (either a 1 or a 0) and, with that, introduced a power model of leakage power consumption of register arrays depending on intermediate cryptographic variables.…”
Section: Leakage Power Analysis Attacks Countermeasures and Fdsoi Tec...mentioning
confidence: 99%