Rožić et al., 2017 - Google Patents
A 5.1 μJ per point‐multiplication elliptic curve cryptographic processorRožić et al., 2017
View PDF- Document ID
- 9806822211172264070
- Author
- Rožić V
- Reparaz O
- Verbauwhede I
- Publication year
- Publication venue
- International Journal of Circuit Theory and Applications
External Links
Snippet
Security features such as privacy and device authentication are required in wireless sensor networks, electronic IDs, Radio Frequency Identification tags, and many other applications. These features are provided using cryptography. Symmetric key cryptography, where the …
- 238000000034 method 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/726—Inversion; Reciprocal calculation; Division of elements of a finite field
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/38—Indexing scheme relating to groups G06F7/38 - G06F7/575
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; Arrangements for supplying electrical power along data transmission lines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1088295B1 (en) | Balanced cryptographic computational method and apparatus for leak minimization in smartcards and other cryptosystems | |
| Saputra et al. | Masking the energy behavior of DES encryption [smart cards] | |
| US10572619B2 (en) | Pseudo-asynchronous digital circuit design | |
| US10951391B2 (en) | Randomized logic against side channel attacks | |
| Masoumi et al. | Novel approach to protect advanced encryption standard algorithm implementation against differential electromagnetic and power analysis | |
| CN102271038A (en) | method for generating a bit vector | |
| WO2015166496A1 (en) | Multi-topology logic gates | |
| Zhang et al. | Power side channels in security ICs: hardware countermeasures | |
| CN102193060B (en) | Method and system for testing integrated circuit devices | |
| Rožić et al. | A 5.1 μJ per point‐multiplication elliptic curve cryptographic processor | |
| Alioto et al. | Differential power analysis attacks to precharged buses: a general analysis for symmetric-key cryptographic algorithms | |
| Masoumi | Differential power analysis: a serious threat for FPGA security | |
| Fan et al. | Low-energy encryption for medical devices: Security adds an extra design dimension | |
| Mazumdar et al. | A compact implementation of Salsa20 and its power analysis vulnerabilities | |
| Gierlichs | DPA-Resistance Without Routing Constraints? –A Cautionary Note About MDPL Security– | |
| Choudary | Efficient multivariate statistical techniques for extracting secrets from electronic devices | |
| EP1802024B1 (en) | Balanced cryptographic computational method and apparatus for leak minimization in smartcards and other cryptosystems | |
| Ambrose et al. | Randomised multi‐modulo residue number system architecture for double‐and‐add to prevent power analysis side channel attacks | |
| Stöttinger et al. | Procedures for securing ecc implementations against differential power analysis using reconfigurable architectures | |
| Diehl | Comparing Costs of Protecting Secret Key Ciphers Against Differential Power Analysis | |
| Schneider et al. | Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor: Implementation and Side-Channel Analysis | |
| JP2008525834A (en) | A secure and compact power method for cryptography | |
| Monfared et al. | Secure and efficient exponentiation architectures using Gaussian normal basis | |
| Ramakrishnan | Sdmlp-secure differential multiplexer logic: Logic design for dpa-resistant cryptographic circuits | |
| Dhanuskodi et al. | LLPA: logic state based leakage power analysis |