Constructive Side-Channel Analysis and Secure Design: Third by Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc

By Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard (auth.), Werner Schindler, Sorin A. Huss (eds.)

This booklet constitutes the refereed lawsuits of the 3rd overseas Workshop on positive Side-Channel research and safe layout, COSADE 2012, held in Darmstadt, Germany, could 2012. The sixteen revised complete papers offered including invited talks have been rigorously reviewed and chosen from forty nine submissions. The papers are geared up in topical sections on useful side-channel research; safe layout; side-channel assaults on RSA; fault assaults; side-channel assaults on ECC; varied equipment in side-channel analysis.

Show description

Read Online or Download Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings PDF

Similar analysis books

Complex Analysis: The Geometric Viewpoint (2nd Edition)

During this moment variation of a Carus Monograph vintage, Steven G. Krantz, a number one employee in complicated research and a winner of the Chauvenet Prize for striking mathematical exposition, develops fabric on classical non-Euclidean geometry. He exhibits the way it may be built in a traditional means from the invariant geometry of the advanced disk.

Topics in analysis and its applications : selected theses

Advances in metrology depend on advancements in clinical and technical wisdom and in instrumentation caliber, in addition to greater use of complex mathematical instruments and improvement of recent ones. during this quantity, scientists from either the mathematical and the metrological fields trade their studies.

Additional info for Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings

Example text

A dual-core structure called PA-DPL (Precharge-Absorbed Dual-rail Precharge Logic) is proposed in [3], which aims to resist EPE problem while keeping routing identical for the implementation on Xilinx FPGA with 6-input LUTs. However, separate placement for dual cores makes it vulnerable to concentrated EM attacks. In this paper, we present a row-crossed interleaved structure to minimize dual rail unbalances caused by the non-identical routings. The main merit is that the identical routing for complementary net pairs can be maintained between both interleaved dualcores thereby increasing the resistance to concentrated EM attacks.

ECC Is Ready for RFID – A Proof in Silicon. , Sica, F. ) SAC 2008. LNCS, vol. 5381, pp. 401–413. : NTRU: A Ring-Based Public Key Cryptosystem. P. ) ANTS 1998. LNCS, vol. 1423, pp. 267–288. : A Cryptographic Processor for LowResource Devices: Canning ECDSA and AES Like Sardines. , Zhou, J. ) WISTP 2011. LNCS, vol. 6633, pp. 144–159. 56 MHz RFID Devices. , Verbauwhede, I. ) CHES 2007. LNCS, vol. 4727, pp. 320–333. : Attacking ECDSA-Enabled RFID Devices. , Vergnaud, D. ) ACNS 2009. LNCS, vol. 5536, pp.

It is much better to deploy mathematical countermeasures such as blinding in the CPU and coprocessor design. These countermeasures address the root cause and provide protection independent of the particular side–channel used for the attack. As to fault attacks, given that a single fault may already lead to a successful attack, it is prudent for the embedded device to react very harshly to any fault attack that it detects, particularly so when assuming that it will not detect all faults to begin with.

Download PDF sample

Rated 4.02 of 5 – based on 3 votes