Paper 2012/353
On Reconfigurable Fabrics and Generic Side-Channel Countermeasures
Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, and Marcin Wójcik
Abstract
The use of field programmable devices in security-critical applications is growing in popularity; in part, this can be attributed to their potential for balancing metrics such as efficiency and algorithm agility. However, in common with non-programmable alternatives, physical attack techniques such as fault and power analysis are a threat. We investigate a family of next-generation field programmable devices, specifically those based on the concept of time sharing,within this context: our results support the premise that extra, inherent flexibility in such devices can offer a range of possibilities for low-overhead, generic countermeasures against physical attack.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- hardware securityfpga securitycryptography
- Contact author(s)
- wojcik @ cs bris ac uk
- History
- 2012-06-26: revised
- 2012-06-22: received
- See all versions
- Short URL
- https://ia.cr/2012/353
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2012/353, author = {Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik}, title = {On Reconfigurable Fabrics and Generic Side-Channel Countermeasures}, howpublished = {Cryptology {ePrint} Archive, Paper 2012/353}, year = {2012}, url = {https://eprint.iacr.org/2012/353} }