From Full-Custom to Fully-Standard Cell Power Analysis Countermeasures

A. Fish, M. Avital, O. Keren

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Side-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digital systems. These attacks exploit and misuse the information related to the physical behavior of cryptographic devices such as power consumption, emitted electromagnetic radiation, etc. One of the most powerful SCA attacks is known as Power Analysis (PA). It does not require any assumptions regarding the hardware implementation of the cryptographic chip, a complex setup or unique measurement equipment. PA attacks target power supply monitoring, and fall into the category of passive non-invasive...
Original languageAmerican English
Title of host publicationTRUDEVICE 2016
StatePublished - 2016

Bibliographical note

Place of conference:Spain

Fingerprint

Dive into the research topics of 'From Full-Custom to Fully-Standard Cell Power Analysis Countermeasures'. Together they form a unique fingerprint.

Cite this