Security evaluation of DPA countermeasures using dual-rail pre-charge logic style

D Suzuki, M Saeki - … on Cryptographic Hardware and Embedded Systems, 2006 - Springer
In recent years, some countermeasures against Differential Power Analysis (DPA) at the
logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a …

Evaluation of the masked logic style MDPL on a prototype chip

T Popp, M Kirschbaum, T Zefferer… - … Hardware and Embedded …, 2007 - Springer
MDPL has been proposed as a masked logic style that counteracts DPA attacks. Recently, it
has been shown that the so-called “early propagation effect” might reduce the security of this …

A first step towards automatic application of power analysis countermeasures

AG Bayrak, F Regazzoni, P Brisk, FX Standaert… - Proceedings of the 48th …, 2011 - dl.acm.org
In cryptography, side channel attacks, such as power analysis, attempt to uncover secret
information from the physical implementation of cryptosystems rather than exploiting …

BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation

M Nassar, S Bhasin, JL Danger, G Duc… - … Design, Automation & …, 2010 - ieeexplore.ieee.org
In this paper, we present BCDL (Balanced Cell-based Dual-rail Logic), a new counter-
measure against Side Channel Attacks (SCA) on cryptoprocessors implementing …

Ask less, get more: Side-channel signal hiding, revisited

I Levi, D Bellizia, D Bol… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Signal hiding countermeasures have been extensively investigated in the early side-
channel attacks' literature. Due to design and physical imperfections, their stand-alone use …

Side-channel attack pitfalls

K Tiri - Proceedings of the 44th annual Design Automation …, 2007 - dl.acm.org
While cryptographic algorithms are usually strong against mathematical attacks, their
practical implementation, both in software and in hardware, opens the door to side-channel …

Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors

JL Danger, S Guilley, S Bhasin… - 2009 3rd International …, 2009 - ieeexplore.ieee.org
The security of cryptographic implementations relies not only on the algorithm quality but
also on the countermeasures to thwart attacks aiming at disclosing the secrecy. These …

Information theoretic evaluation of side-channel resistant logic styles

F Macé, FX Standaert, JJ Quisquater - Cryptographic Hardware and …, 2007 - Springer
We propose to apply an information theoretic metric to the evaluation of side-channel
resistant logic styles. Due to the long design and development time required for the physical …

A hardware-based countermeasure to reduce side-channel leakage: Design, implementation, and evaluation

A Gornik, A Moradi, J Oehm… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Side-channel attacks are one of the major concerns for security-enabled applications as
they make use of information leaked by the physical implementation of the underlying …

Automatic application of power analysis countermeasures

AG Bayrak, F Regazzoni, D Novo… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
We introduce a compiler that automatically inserts software countermeasures to protect
cryptographic algorithms against power-based side-channel attacks. The compiler first …