Paper 2012/353

On Reconfigurable Fabrics and Generic Side-Channel Countermeasures

Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, and Marcin Wójcik

Abstract

The use of field programmable devices in security-critical applications is growing in popularity; in part, this can be attributed to their potential for balancing metrics such as efficiency and algorithm agility. However, in common with non-programmable alternatives, physical attack techniques such as fault and power analysis are a threat. We investigate a family of next-generation field programmable devices, specifically those based on the concept of time sharing,within this context: our results support the premise that extra, inherent flexibility in such devices can offer a range of possibilities for low-overhead, generic countermeasures against physical attack.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
hardware securityfpga securitycryptography
Contact author(s)
wojcik @ cs bris ac uk
History
2012-06-26: revised
2012-06-22: received
See all versions
Short URL
https://ia.cr/2012/353
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/353,
      author = {Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik},
      title = {On Reconfigurable Fabrics and Generic Side-Channel Countermeasures},
      howpublished = {Cryptology ePrint Archive, Paper 2012/353},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/353}},
      url = {https://eprint.iacr.org/2012/353}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.