{"title":"An evaluation methodology for the security of cryptosystems","authors":"Selma Laabidi, B. Robisson, M. Agoyan","doi":"10.1109/RME.2008.4595738","DOIUrl":null,"url":null,"abstract":"This paper describes an integrated circuit design methodology which evaluates at the gate level the resistance of the circuit to a class of attacks, among them is the well-known Differential Power Analysis (DPA). This is of particular concern since it enables the designer to detect design strengths and weaknesses and to compare and choose different circuitpsilas architectures at an early stage of the design flow. The proposed methodology has been applied to different hardware models of the Advanced Encryption Standard (AES) and highlights substantial differences between the models in terms of area and security.","PeriodicalId":140550,"journal":{"name":"2008 Ph.D. Research in Microelectronics and Electronics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Ph.D. Research in Microelectronics and Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RME.2008.4595738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper describes an integrated circuit design methodology which evaluates at the gate level the resistance of the circuit to a class of attacks, among them is the well-known Differential Power Analysis (DPA). This is of particular concern since it enables the designer to detect design strengths and weaknesses and to compare and choose different circuitpsilas architectures at an early stage of the design flow. The proposed methodology has been applied to different hardware models of the Advanced Encryption Standard (AES) and highlights substantial differences between the models in terms of area and security.