Although tamper-resistant devices are specifically designed to thwart invasive attacks, they remain vulnerable to micro-probing. Among several possibilities to provide data obfuscations, keyed hardware permutations can provide compact design and easy diversification. We discuss the efficiency of such primitives, and we give several examples of implementations, along with proofs of effectively large key-space.
CITATION STYLE
Brier, E., Handschuh, H., & Tymen, C. (2001). Fast primitives for internal data scrambling in tamper resistant hardware. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2162, pp. 16–27). Springer Verlag. https://doi.org/10.1007/3-540-44709-1_3
Mendeley helps you to discover research relevant for your work.