2003 Design, Automation and Test in Europe Conference and Exhibition
DOI: 10.1109/date.2003.1253591
|View full text |Cite
|
Sign up to set email alerts
|

Masking the energy behavior of DES encryption [smart cards]

Abstract: Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has drawn a lot of negative publicity for smart card usage. The power measurement techniques rely on the data-dependent energy behavior of the underlying system. Further, power analysis can be used to identify the specific portions of the program being executed to induce timing glitches that may in turn help to bypass key checking. Thus, i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 56 publications
(37 citation statements)
references
References 11 publications
0
37
0
Order By: Relevance
“…This approach is capable of mimicking all the major mobile code paradigms, as shown in [3]. Furthermore, its polymorphic code selection system permits us to use the optimal algorithm on a given system without significant user interaction.…”
Section: Node Design and Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach is capable of mimicking all the major mobile code paradigms, as shown in [3]. Furthermore, its polymorphic code selection system permits us to use the optimal algorithm on a given system without significant user interaction.…”
Section: Node Design and Implementationmentioning
confidence: 99%
“…3 , can be found in [Barabasi 19991. Barabesi's use of positive feedback plausibly explains how SF systems emerge and why they are widespread.…”
Section: Analysis Of Random Network Designsmentioning
confidence: 99%
“…There have been several attacks that exploit weaknesses in caches [5,8,19,21,48,49,50,51,51,52] and branch prediction [6,7,9]. Some countermeasures against these threats include self-destructing keys [32,35,62,72] and new circuit styles that consume the same operational power irrespective of input values [27,38,58,64,65] and microarchitectural techniques [11,22,63,66,69].…”
Section: Related Workmentioning
confidence: 99%
“…The first approach attempts to make the power consumption constant regardless of what intermediate result being produced. A straightforward method is to use the dual rail logic [7,10,12,14], that represents a data bit by a pair of complementary wires and takes the same number of transitions regardless of what data value it transfers.…”
Section: Introductionmentioning
confidence: 99%