Secure Logic Synthesis

@inproceedings{Tiri2004SecureLS,
  title={Secure Logic Synthesis},
  author={Kris Tiri and Ingrid Verbauwhede},
  booktitle={FPL},
  year={2004}
}
  • Kris Tiri, Ingrid Verbauwhede
  • Published in FPL 2004
  • Computer Science
  • This paper describes the synthesis of dynamic differential logic to increase the resistance of FPGAs against Differential Power Analysis. Compared with an existing technique, it saves more than a factor 2 in slice utilization. Experimental results indicate that a secure version of the AES algorithm can now be implemented with a mere doubling of the slice utilization when compared with a normal non-secure single ended implementation. 

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Figures, Tables, and Topics from this paper.

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 20 CITATIONS

    Secured-by-design FPGA: look-up tables and switch-boxes

    • Ziyad Almohaimeed, Mihai Sima
    • Computer Science
    • 2015 Nordic Circuits and Systems Conference (NORCAS): NORCHIP & International Symposium on System-on-Chip (SoC)
    • 2015
    VIEW 3 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks

    VIEW 3 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    FPGA Implementation of pAsynch Design Paradigm

    VIEW 1 EXCERPT
    CITES BACKGROUND

    INVITED: Protecting RISC-V against Side-Channel Attacks

    SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Embedded randomness and data dependencies design paradigm: Advantages and challenges

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Look-Up tables with multiple inputs for secured-by-design FPGAs

    VIEW 1 EXCERPT
    CITES BACKGROUND

    A New SPA Attack on ECC with Regular Point Multiplication

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Hardware level countermeasures against differential power analysis

    VIEW 1 EXCERPT
    CITES METHODS

    References

    Publications referenced by this paper.
    SHOWING 1-5 OF 5 REFERENCES

    How Secure Are FPGAs in Cryptographic Applications?

    VIEW 5 EXCERPTS
    HIGHLY INFLUENTIAL

    A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation

    VIEW 3 EXCERPTS

    Synthesis of Secure FPGA Implementations

    VIEW 1 EXCERPT