Paper 2011/077
DPA Leakage Evaluation and Countermeasure Plug-in
Tang Ming, Wang Xiaorong, Qiu Zhenlong, Gao Si, Zhang Huanguo, and Wu Qianhong
Abstract
There exist 3 different types of research about SCAs, such as SCA analysis, SCA evaluation and SCA countermeasures. All of these studies try to establish more security in cryptographic software, hardware and system. Evaluation of SCA tries to find factors of different SCAs, moreover, the purpose of SCA Evaluation could be regarded as the first step of building countermeasures against SCAs. We choose DPA, which is one of the most popular and realistic SCAs at present, as our research target to build practical evaluation scheme and countermeasure which can be regarded as plug-in of EDA toolkits and could help designers of circuits to judge the power leakage and improve the resistance against DPAs automatically. Our contribution concludes: more accurate evaluation scheme; more efficient balanced scheme; be portable to build countermeasures based on evaluation scheme, furthermore, our countermeasures could be plug in EDA toolkits which is automatic and transparent to designers of circuits.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Contact author(s)
- m tang @ 126 com
- History
- 2011-02-20: received
- Short URL
- https://ia.cr/2011/077
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/077, author = {Tang Ming and Wang Xiaorong and Qiu Zhenlong and Gao Si and Zhang Huanguo and Wu Qianhong}, title = {{DPA} Leakage Evaluation and Countermeasure Plug-in}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/077}, year = {2011}, url = {https://eprint.iacr.org/2011/077} }