SR Shanmugham… - IET Wireless Sensor …, 2018 - Wiley Online Library
Smart or intelligent sensors are integrated physical units embedded with sensors, processors, and communication devices. The sensors also known as edge nodes form the …
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. Its continuous growth …
D Bellizia, S Bongiovanni, P Monsurrò… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Power analysis attacks (PAAs), a class of side-channel attacks based on power consumption measurements, are a major concern in the protection of secret data stored in …
D Bellizia, S Bongiovanni, M Olivieri… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper we present the Standard Cell Delay-based Dual-rail Pre-charge Logic (SC- DDPL), a novel logic style which is able to counteract Power Analysis Attacks (PAAs) also in …
T Moos - IACR Transactions on Cryptographic Hardware and …, 2019 - tches.iacr.org
Semiconductor technology scaling faced tough engineering challenges while moving towards and beyond the deep sub-micron range. One of the most demanding issues, limiting …
In recent years, static power side-channel analysis attacks have emerged as a serious threat to cryptographic implementations, overcoming state-of-the-art countermeasures against side …
Noise is an important ingredient for side‐channel‐analysis countermeasures security. However, physical noise is in most cases not sufficient to achieve high‐security levels. As an …
D Bellizia, M Djukanovic, G Scotti… - International Journal of …, 2017 - Wiley Online Library
A new class of template attacks aiming at recovering the secret key of a cryptographic core from measurements of its static power consumption is presented in this paper. These attacks …
J Xu, HM Heys - International Journal of Circuit Theory and …, 2019 - Wiley Online Library
Side‐channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side‐channel attacks …