An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays

@article{Standaert2006AnOO,
  title={An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays},
  author={François-Xavier Standaert and Eric Peeters and Ga{\"e}l Rouvroy and Jean-Jacques Quisquater},
  journal={Proceedings of the IEEE},
  year={2006},
  volume={94},
  pages={383-394}
}
Since their introduction by Kocher in 1998, power analysis attacks have attracted significant attention within the cryptographic community. While early works in the field mainly threatened the security of smart cards and simple processors, several recent publications have shown the vulnerability of hardware implementations as well. In particular, field programmable gate arrays are attractive options for hardware implementation of encryption algorithms,but their security against power analysis… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 68 CITATIONS

Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures

  • IEEE Transactions on Emerging Topics in Computing
  • 2018
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

A Voltage Regulator-Assisted Lightweight AES Implementation Against DPA Attacks

  • IEEE Transactions on Circuits and Systems I: Regular Papers
  • 2016
VIEW 7 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks

  • IEEE Transactions on Circuits and Systems I: Regular Papers
  • 2017
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

False Key-Controlled Aggressive Voltage Scaling: A Countermeasure Against LPA Attacks

  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  • 2017
VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Impact of Power Distribution Network on Power Analysis Attacks in Three-Dimensional Integrated Circuits

  • ACM Great Lakes Symposium on VLSI
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Security-Adaptive Voltage Conversion as a Lightweight Countermeasure Against LPA Attacks

  • IEEE Transactions on Very Large Scale Integration (VLSI) Systems
  • 2017
VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Success through confidence: Evaluating the effectiveness of a side-channel attack

  • IACR Cryptology ePrint Archive
  • 2013
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2005
2019

CITATION STATISTICS

  • 13 Highly Influenced Citations

References

Publications referenced by this paper.
SHOWING 1-10 OF 44 REFERENCES

Poweranalysis attack on an ASIC AES implementation

S. B. Ors, F. Gurkaynak, E. Oswald, B. Preneel
  • presented at the ITCC 2004, Las Vegas, NV.
  • 2004
VIEW 12 EXCERPTS
HIGHLY INFLUENTIAL

Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem

  • EUROCON 2005 - The International Conference on "Computer as a Tool"
  • 2005
VIEW 1 EXCERPT

On the masking countermeasure and higher-order power analysis attacks

  • International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
  • 2005
VIEW 1 EXCERPT

Similar Papers