An overview of power analysis attacks against field programmable gate arrays

114Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since their introduction by Kocher in 1998, power analysis attacks have attracted significant attention within the cryptographic community. While early works in the field mainly threatened the security of smart cards and simple processors, several recent publications have shown the vulnerability of hardware implementations as well. In particular, field programmable gate arrays are attractive options for hardware implementation of encryption algorithms, but their security against power analysis is a serious concern, as we discuss in this paper. For this purpose, we present recent results of attacks attempted against standard encryption algorithms, provide a theoretical estimation of these attacks based on simple statistical parameters and evaluate the cost and security of different possible countermeasures. © 2006 IEEE.

Cite

CITATION STYLE

APA

Standaert, F. X., Peeters, E., Rouvroy, G., & Quisquater, J. J. (2006). An overview of power analysis attacks against field programmable gate arrays. In Proceedings of the IEEE (Vol. 94, pp. 383–394). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/JPROC.2005.862437

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free