Learn More
Security ICs are vulnerable to side-channel attacks (SCAs) that find the secret key by monitoring the power consumption and other information that is leaked by the switching behavior of digital CMOS gates. This paper describes a side-channel attack resistant coprocessor IC and its design techniques. The IC has been fabricated in 0.18µm CMOS. The(More)
Recently, the development of Machine to Machine (M2M) communication has been largely accomplished in a variety of fields including smart home. In M2M communication, the role of sensor node is only limited to gather data and send them to upper application layers. In this research, the limited role of the sensor node in traditional M2M communication is(More)
SUMMARY This paper presents a simulation based method to predict the amount of frequency interference in a passive type RFID system. To judge occurrence of frequency interference, we use a parameter POI (probability of interference) that depends on several factors such as multiple access method, emission mask, the number of channel, etc. Due to its(More)
  • 1