Nothing Special   »   [go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2011/077

DPA Leakage Evaluation and Countermeasure Plug-in

Tang Ming, Wang Xiaorong, Qiu Zhenlong, Gao Si, Zhang Huanguo, and Wu Qianhong

Abstract

There exist 3 different types of research about SCAs, such as SCA analysis, SCA evaluation and SCA countermeasures. All of these studies try to establish more security in cryptographic software, hardware and system. Evaluation of SCA tries to find factors of different SCAs, moreover, the purpose of SCA Evaluation could be regarded as the first step of building countermeasures against SCAs. We choose DPA, which is one of the most popular and realistic SCAs at present, as our research target to build practical evaluation scheme and countermeasure which can be regarded as plug-in of EDA toolkits and could help designers of circuits to judge the power leakage and improve the resistance against DPAs automatically. Our contribution concludes: more accurate evaluation scheme; more efficient balanced scheme; be portable to build countermeasures based on evaluation scheme, furthermore, our countermeasures could be plug in EDA toolkits which is automatic and transparent to designers of circuits.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
m tang @ 126 com
History
2011-02-20: received
Short URL
https://ia.cr/2011/077
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/077,
      author = {Tang Ming and Wang Xiaorong and Qiu Zhenlong and Gao Si and Zhang Huanguo and Wu Qianhong},
      title = {{DPA} Leakage Evaluation and Countermeasure Plug-in},
      howpublished = {Cryptology {ePrint} Archive, Paper 2011/077},
      year = {2011},
      url = {https://eprint.iacr.org/2011/077}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.