Abstract | ||
---|---|---|
Power side-channel attacks are a very effective cryptanalysis technique that can infer secret keys of security ICs by monitoring a chip’s power consumption. Since the emergence of practical attacks in the late 90s, they have been a major threat to many cryptographic-equipped devices including smart cards, encrypted FPGA designs, and mobile phones. Designers and manufacturers of cryptographic devices have in response developed various countermeasures for protection. Attacking methods have also evolved to counteract resistant implementations. This paper reviews foundational power analysis attack techniques and examines a variety of hardware design mitigations. The aim is to highlight exposed vulnerabilities in hardware-based countermeasures for future more secure implementations. |
Year | Venue | Field |
---|---|---|
2016 | arXiv: Cryptography and Security | Power analysis,Computer security,Cryptography,Computer science,Smart card,Cryptanalysis,Field-programmable gate array,Encryption,Chip,Implementation,Computer hardware,Embedded system |
DocType | Volume | Citations |
Journal | abs/1605.00681 | 1 |
PageRank | References | Authors |
0.36 | 37 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lu Zhang | 1 | 54 | 16.33 |
Luis Vega | 2 | 1 | 0.70 |
Michael Bedford Taylor | 3 | 1707 | 154.51 |