Black-box side-channel attacks highlight the importance of countermeasures. An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism
From MaRDI portal
Publication:2889990
Recommendations
- Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series
- Generic Side-Channel Countermeasures for Reconfigurable Devices
- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
- The first thorough side-channel hardware Trojan
- Cryptographic Hardware and Embedded Systems - CHES 2004
Cites work
- scientific article; zbMATH DE number 1504807 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
Cited in
(6)- Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series
- The first thorough side-channel hardware Trojan
- Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks
- A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks
This page was built for publication: Black-box side-channel attacks highlight the importance of countermeasures. An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889990)