Title
27.3 EM and Power SCA-Resilient AES-256 in 65nm CMOS Through >350× Current-Domain Signature Attenuation.
Abstract
Computationally-secure cryptographic algorithms when implemented on physical platforms leak critical physical signals correlated with the secret key in the form of power consumption and electromagnetic (EM) emanations. This can be exploited by an adversary, leading to side-channel attacks (SCA) that can recover the secret key. Circuit-level on-chip countermeasures include a switched-capacitor current equalizer [1], charge-recovery logic [2], an integrated voltage regulator (IVR) [3], and an all-digital low-dropout (LDO) regulator [4], which suffer from performance degradation, high power/area overheads because of large embedded passives, as well as EM leakage from large metal-insulator-metal (MIM) capacitor top plates. Alternatively, simulations of shunt LDO-based regulators have been shown to be effective for power SCA resistance [5]. Noting that the correlated current is the source of both power (at supply pin) and EM leakage (radiation throughout current path), this work embraces current-domain ‘signature attenuation’ (CDSA) as a low-overhead generic countermeasure against both EM and power side-channel attacks to achieve the highest minimum traces to disclosure (MTD $\u003e 1\\mathrm{B})$ reported to date.
Year
DOI
Venue
2020
10.1109/ISSCC19947.2020.9062997
ISSCC
DocType
Citations 
PageRank 
Conference
0
0.34
References 
Authors
0
14
Name
Order
Citations
PageRank
Debayan Das14313.00
Josef Danial2103.36
Anupam Golder3102.34
Nirmoy Modak412.39
Shovan Maity54813.32
Baibhab Chatterjee600.34
Dong-Hyun Seo711.38
Muya Chang852.11
Avinash Varna900.34
harini krishnamurthy109214.16
S. Mathew1146276.59
Santosh Ghosh12195.71
Arijit Raychowdhury1328448.04
Shreyas Sen1433754.39