eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2012/353

On Reconfigurable Fabrics and Generic Side-Channel Countermeasures

Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, and Marcin Wójcik

Abstract

The use of field programmable devices in security-critical applications is growing in popularity; in part, this can be attributed to their potential for balancing metrics such as efficiency and algorithm agility. However, in common with non-programmable alternatives, physical attack techniques such as fault and power analysis are a threat. We investigate a family of next-generation field programmable devices, specifically those based on the concept of time sharing,within this context: our results support the premise that extra, inherent flexibility in such devices can offer a range of possibilities for low-overhead, generic countermeasures against physical attack.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
hardware securityfpga securitycryptography
Contact author(s)
wojcik @ cs bris ac uk
History
2012-06-26: revised
2012-06-22: received
See all versions
Short URL
https://ia.cr/2012/353
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/353,
      author = {Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik},
      title = {On Reconfigurable Fabrics and Generic Side-Channel Countermeasures},
      howpublished = {Cryptology ePrint Archive, Paper 2012/353},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/353}},
      url = {https://eprint.iacr.org/2012/353}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.