Exploring an AES Crypto-processor Design Using a Secure Asynchronous Toolset
@inproceedings{Miri2008ExploringAA, title={Exploring an AES Crypto-processor Design Using a Secure Asynchronous Toolset}, author={Seyedeh Pardis Miri and Behnam Ghavami and Mehrdad Najibi and Hossein Pedram}, year={2008} }
Asynchronous circuit design techniques, especially balanced, finely-grained pipelines are able to play a key role, particularly in making hardware designs inherently resistant to side-channel attacks.In this paper, the asynchronous design of the AES cryptoprocessor is elaborated. Having the asynchronous processor being synthesized by an automatic tool for synthesizing asynchronous circuits, full functional test at various levels of design was performed. The Results have shown that the…
13 References
An Automatic Design Flow for Implementation of Side Channel Attacks Resistant Crypto-Chips
- 2007
Computer Science, Mathematics
PATMOS
A fully automated secure design flow and a set of secure library cells resistant to power analysis and fault injection attacks are introduced for QDI asynchronous circuits and show that using this scheme is approximately 5.62 times more balanced than the best cells designed using previous synchronous balancing methods.
Robust Codes for Fault Attack Resistant Cryptographic Hardware
- 2005
Computer Science
This work proposes an architecture based on robust nonlinear systematic (n,k)-error-detecting codes which offer advantages over linear codes since they are capable of providing uniform error detecting coverage independently of the error distributions.
Improving smart card security using self-timed circuits
- 2002
Computer Science
Proceedings Eighth International Symposium on Asynchronous Circuits and Systems
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructing smart card functions that are resistant to side channel attacks and fault injection. A novel…
Principles of Asynchronous Circuit Design: A Systems Perspective
- 2010
Computer Science
Industrial designers with a background in conventional (clocked) design to be able to understand asynchronous design sufficiently to assess what it has to offer and whether it might be advantageous in their next design task.
Verilog HDL, powered by PLI: a suitable framework for describing and modeling asynchronous circuits at all levels of abstraction
- 2003
Computer Science
Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451)
In this paper, we show how to use Verilog HDL along with PLI (Programming Language Interface) to model asynchronous circuits at the behavioral level by implementing CSP (Communicating Sequential…
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
- 2001
Computer Science
E-smart
It is shown that the electromagnetic attack obtains at least the same result as power consumption and consequently must be carefuly taken into account.
Differential Power Analysis, in Proc.19th Intl
- 1999
Advances in Cryptology Conference-CRYPTO99, Aug
Attacks on Implementations of Diffe- Hellman, RSA, DSS and Other Systems,
- 1996
in Proc. 16th Intl. Advances in Cryptology Conference-CRYPTO96,
Jun, Differential Power Analysis
- 1999
Proc.19th Intl. Advances in Cryptology Conference-CRYPTO99
Hardware-level mitigation and DPA countermeasures for Cryptogra phic devices
Hardware-level mitigation and DPA countermeasures for Cryptogra phic devices