A model of DPA syndrome and its application to the identification of leaking gates

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Within the context of secure applications, side channel attacks are a major threat. The main characteristic of these attacks is that they exploit physical syndromes, such as power consumption rather than Boolean data. Among all the known side channel attacks the differential power analysis appears as one of the most efficient. This attack constitutes the main topic of this paper. More precisely, a design oriented modelling of the syndrome (signature) obtained while performing Differential Power Analysis of Kocher is introduced. As a validation of this model, it is shown how it allows identifying the leaking nets and gates during the logical synthesis step. The technology considered herein is a 130nm process. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Razafindraibe, A., & Maurine, P. (2007). A model of DPA syndrome and its application to the identification of leaking gates. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4644 LNCS, pp. 394–403). Springer Verlag. https://doi.org/10.1007/978-3-540-74442-9_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free