An automatic design flow for implementation of side channel attacks resistant crypto-chips

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, it has been proven that asynchronous circuits possess considerable inherent countermeasure against side channel attacks. In spite of these systems' advantages for immune cryptography, because of the lack of automatic design tools and standard methods, exploiting such schemes faces difficulties. In this paper, a fully automated secure design flow and a set of secure library cells resistant to power analysis and fault injection attacks are introduced for QDI asynchronous circuits. In this flow a standard cell library has been introduced which has resistance to differential power analysis on faulty hardware attack. The results show that using this scheme is approximately 5.62 times more balanced than the best cells designed using previous synchronous balancing methods. To verify the efficiency of our presented flow we applied it to implementation of the AES cryptography algorithm. Also, this implementation shows a 2.8 times throughput improvement over the synchronous implementation using the same technology. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Ghavami, B., & Pedram, H. (2007). An automatic design flow for implementation of side channel attacks resistant crypto-chips. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4644 LNCS, pp. 330–339). Springer Verlag. https://doi.org/10.1007/978-3-540-74442-9_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free