A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Towards Sound Approaches to Counteract Power-Analysis Attacks
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Parallel VLSI Architectures for Cryptographic Systems
GLS '97 Proceedings of the 7th Great Lakes Symposium on VLSI
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Evaluation of Dynamic Voltage and Frequency Scaling as a Differential Power Analysis Countermeasure
VLSID '07 Proceedings of the 20th International Conference on VLSI Design held jointly with 6th International Conference: Embedded Systems
Investigations of power analysis attacks on smartcards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
FPGA Based Design of Elliptic Curve Cryptography Coprocessor
ICNC '07 Proceedings of the Third International Conference on Natural Computation - Volume 05
Protection Circuit against Differential Power Analysis Attacks for Smart Cards
IEEE Transactions on Computers
An Efficient Implementation of RSA Digital Signature Algorithm
ICICTA '08 Proceedings of the 2008 International Conference on Intelligent Computation Technology and Automation - Volume 02
Enhanced Correlation Power Analysis Attack on Smart Card
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
IEEE Transactions on Computers
Experiments and hardware countermeasures on power analysis attacks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Hi-index | 0.00 |
With the massive deployment of mobile devices and sensor networks, resistance against side-channel attacks in cryptographic systems has become an active research topic in recent years. While various security measures exist in literature, most of them are deterministic in nature, where the same input plaintext always results in the same power trace with a given key. Thus, attackers can still aggregate the small deviations between the power traces to identify the correct key. Towards this, random dynamic voltage scaling has been proposed in the literature, which is demonstrated to be effective against Differential Power Analysis (DPA). In this paper, we evaluate this approach, along with the expanded feature of spatial randomness, to resist Correlation Power Analysis (CPA).