Meynard et al., 2011 - Google Patents
Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniquesMeynard et al., 2011
- Document ID
- 4510157656913565491
- Author
- Meynard O
- Réal D
- Flament F
- Guilley S
- Homma N
- Danger J
- Publication year
- Publication venue
- 2011 Design, Automation & Test in Europe
External Links
Snippet
SPA/SEMA (Simple Power/Electro-magnetic Analysis) attacks performed on public-key cryptographic modules implemented on FPGA platforms are well known from the theoretical point of view. However, the practical aspect is not often developed in the literature. But …
- 238000000034 method 0 title abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Meynard et al. | Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques | |
Agrawal et al. | The EM side—channel (s) | |
Genkin et al. | Get your hands off my laptop: physical side-channel key-extraction attacks on pcs: Extended version | |
Genkin et al. | Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation | |
Le et al. | Noise reduction in side channel attack using fourth-order cumulant | |
Sauvage et al. | Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module | |
Skorobogatov et al. | In the blink of an eye: There goes your AES key | |
Goller et al. | Side channel attacks on smartphones and embedded devices using standard radio equipment | |
Kim et al. | Side channel analysis attacks using AM demodulation on commercial smart cards with SEED | |
Standaert et al. | Power analysis of FPGAs: How practical is the attack? | |
Meynard et al. | Characterization of the electromagnetic side channel in frequency domain | |
Khan et al. | Detailed tracking of program control flow using analog side-channel signals: a promise for iot malware detection and a threat for many cryptographic implementations | |
Sauvage et al. | Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints | |
De Mulder | Electromagnetic techniques and probes for side-channel analysis on cryptographic devices | |
Tiu | A new frequency-based side channel attack for embedded systems | |
Rohatgi | Electromagnetic attacks and countermeasures | |
Durvaux et al. | SCA-Pitaya: A Practical and Affordable Side-Channel Attack Setup for Power Leakage--Based Evaluations | |
Monjur et al. | Nonce@ Once: A single-trace EM side channel attack on several constant-time elliptic curve implementations in mobile platforms | |
Hogenboom et al. | Principal component analysis and side-channel attacks-master thesis | |
Gu et al. | Design and implementation of an electromagnetic analysis system for smart cards | |
Varchola et al. | Side channel attack on multiprecision multiplier used in protected ECDSA implementation | |
Guilley et al. | Enhancement of Simple Electro-Magnetic Attacks by Pre-characterization in Frequency Domain and Demodulation Techniques | |
Do et al. | Electromagnetic side-channel analysis on Intel Atom Processor | |
Diop et al. | From theory to practice: horizontal attacks on protected implementations of modular exponentiations | |
Matthews | Low cost attacks on smart cards: the electromagnetic sidechannel |