Nothing Special   »   [go: up one dir, main page]

Meynard et al., 2011 - Google Patents

Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques

Meynard et al., 2011

Document ID
4510157656913565491
Author
Meynard O
Réal D
Flament F
Guilley S
Homma N
Danger J
Publication year
Publication venue
2011 Design, Automation & Test in Europe

External Links

Snippet

SPA/SEMA (Simple Power/Electro-magnetic Analysis) attacks performed on public-key cryptographic modules implemented on FPGA platforms are well known from the theoretical point of view. However, the practical aspect is not often developed in the literature. But …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators

Similar Documents

Publication Publication Date Title
Meynard et al. Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques
Agrawal et al. The EM side—channel (s)
Genkin et al. Get your hands off my laptop: physical side-channel key-extraction attacks on pcs: Extended version
Genkin et al. Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation
Le et al. Noise reduction in side channel attack using fourth-order cumulant
Sauvage et al. Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module
Skorobogatov et al. In the blink of an eye: There goes your AES key
Goller et al. Side channel attacks on smartphones and embedded devices using standard radio equipment
Kim et al. Side channel analysis attacks using AM demodulation on commercial smart cards with SEED
Standaert et al. Power analysis of FPGAs: How practical is the attack?
Meynard et al. Characterization of the electromagnetic side channel in frequency domain
Khan et al. Detailed tracking of program control flow using analog side-channel signals: a promise for iot malware detection and a threat for many cryptographic implementations
Sauvage et al. Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
De Mulder Electromagnetic techniques and probes for side-channel analysis on cryptographic devices
Tiu A new frequency-based side channel attack for embedded systems
Rohatgi Electromagnetic attacks and countermeasures
Durvaux et al. SCA-Pitaya: A Practical and Affordable Side-Channel Attack Setup for Power Leakage--Based Evaluations
Monjur et al. Nonce@ Once: A single-trace EM side channel attack on several constant-time elliptic curve implementations in mobile platforms
Hogenboom et al. Principal component analysis and side-channel attacks-master thesis
Gu et al. Design and implementation of an electromagnetic analysis system for smart cards
Varchola et al. Side channel attack on multiprecision multiplier used in protected ECDSA implementation
Guilley et al. Enhancement of Simple Electro-Magnetic Attacks by Pre-characterization in Frequency Domain and Demodulation Techniques
Do et al. Electromagnetic side-channel analysis on Intel Atom Processor
Diop et al. From theory to practice: horizontal attacks on protected implementations of modular exponentiations
Matthews Low cost attacks on smart cards: the electromagnetic sidechannel