You are looking at a specific version 20150810:071922 of this paper.
See the latest version.
Paper 2015/786
Buying AES Design Resistance with Speed and Energy
Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto
Abstract
Fault and power attacks are two common ways of extracting secrets from tamper-resistant chips. Although several protections have been proposed to thwart these attacks, resistant designs usually claim significant area or speed overheads. Furthermore, circuit-level countermeasures are usually not reconfigurable at runtime. This paper exploits the AES’ algorithmic features to propose low-cost and low-latency protections. We provide Verilog and FPGA implementation details. Using our design, real-life applications can be configured during runtime to meet the user’s needs and the system’s constraints.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint. MINOR revision.
- Keywords
- side channel attacksfault attacksAES
- Contact author(s)
- david naccache @ ens fr
- History
- 2015-08-10: revised
- 2015-08-07: received
- See all versions
- Short URL
- https://ia.cr/2015/786
- License
-
CC BY