Publication | Closed Access
Power Attacks on Secure Hardware Based on Early Propagation of Data
51
Citations
7
References
2006
Year
Unknown Venue
Hardware TrojanEngineeringInformation SecurityPower Optimization (Eda)Computer ArchitectureSide-channel AttackHardware SecurityData-dependent Power ConsumptionPower AttacksHardware Security SolutionSecure HardwarePower-aware DesignPower AnalysisElectrical EngineeringPower-aware ComputingComputer EngineeringComputer ScienceData SecurityCryptographyEarly PropagationAttack ModelSecurityEarly Propagation EffectFault AttackPower Analysis Attacks
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency can be targeted for successful power analysis attacks in cryptographic hardware. Many of the current balanced gate designs did not directly consider the effect and are vulnerable to power analysis attacks
| Year | Citations | |
|---|---|---|
Page 1
Page 1