Protecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stage
From MaRDI portal
Publication:2145294
Recommendations
- scientific article; zbMATH DE number 1979273
- Design methodology and validity verification for a reactive countermeasure against EM attacks
- EM attack is non-invasive? - design methodology and validity verification of EM attack sensor
- Localized electromagnetic analysis of cryptographic implementations
- EM Probes Characterisation for Security Analysis
Cites work
- scientific article; zbMATH DE number 1759297 (Why is no real title available?)
- scientific article; zbMATH DE number 1878336 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
Cited in
(2)
This page was built for publication: Protecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2145294)