Black-box side-channel attacks highlight the importance of countermeasures. An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism
From MaRDI portal
Publication:2889990
DOI10.1007/978-3-642-27954-6_1zbMATH Open1292.94117OpenAlexW1598124977MaRDI QIDQ2889990FDOQ2889990
Authors: Markus Kasper, Christof Paar
Publication date: 8 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-27954-6_1
Recommendations
- Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series
- Generic Side-Channel Countermeasures for Reconfigurable Devices
- Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
- The first thorough side-channel hardware Trojan
- Cryptographic Hardware and Embedded Systems - CHES 2004
Cites Work
Cited In (6)
- Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series
- The first thorough side-channel hardware Trojan
- Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks
- A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
- Detecting side channel vulnerabilities in improved rotating S-box masking scheme -- presenting four non-profiled attacks
Uses Software
This page was built for publication: Black-box side-channel attacks highlight the importance of countermeasures. An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889990)