Paper 2011/077

DPA Leakage Evaluation and Countermeasure Plug-in

Tang Ming, Wang Xiaorong, Qiu Zhenlong, Gao Si, Zhang Huanguo, and Wu Qianhong


There exist 3 different types of research about SCAs, such as SCA analysis, SCA evaluation and SCA countermeasures. All of these studies try to establish more security in cryptographic software, hardware and system. Evaluation of SCA tries to find factors of different SCAs, moreover, the purpose of SCA Evaluation could be regarded as the first step of building countermeasures against SCAs. We choose DPA, which is one of the most popular and realistic SCAs at present, as our research target to build practical evaluation scheme and countermeasure which can be regarded as plug-in of EDA toolkits and could help designers of circuits to judge the power leakage and improve the resistance against DPAs automatically. Our contribution concludes: more accurate evaluation scheme; more efficient balanced scheme; be portable to build countermeasures based on evaluation scheme, furthermore, our countermeasures could be plug in EDA toolkits which is automatic and transparent to designers of circuits.

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
m tang @ 126 com
2011-02-20: received
Short URL
Creative Commons Attribution


      author = {Tang Ming and Wang Xiaorong and Qiu Zhenlong and Gao Si and Zhang Huanguo and Wu Qianhong},
      title = {DPA Leakage Evaluation and Countermeasure Plug-in},
      howpublished = {Cryptology ePrint Archive, Paper 2011/077},
      year = {2011},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.