Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics
Cryptographic circuits are nowadays subject to attacks that no longer focus on the algorithm but rather on its physical implementation. Attacks exploiting information leaked by the hardware implementation are called side-channel attacks (SCAs). Among these attacks, the differential power analysis (D...
Saved in:
Published in | IEEE transactions on computers Vol. 59; no. 9; pp. 1250 - 1263 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.09.2010
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Institute of Electrical and Electronics Engineers |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!