{"title":"密码系统安全性的评估方法","authors":"Selma Laabidi, B. Robisson, M. Agoyan","doi":"10.1109/RME.2008.4595738","DOIUrl":null,"url":null,"abstract":"This paper describes an integrated circuit design methodology which evaluates at the gate level the resistance of the circuit to a class of attacks, among them is the well-known Differential Power Analysis (DPA). This is of particular concern since it enables the designer to detect design strengths and weaknesses and to compare and choose different circuitpsilas architectures at an early stage of the design flow. The proposed methodology has been applied to different hardware models of the Advanced Encryption Standard (AES) and highlights substantial differences between the models in terms of area and security.","PeriodicalId":140550,"journal":{"name":"2008 Ph.D. Research in Microelectronics and Electronics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An evaluation methodology for the security of cryptosystems\",\"authors\":\"Selma Laabidi, B. Robisson, M. Agoyan\",\"doi\":\"10.1109/RME.2008.4595738\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes an integrated circuit design methodology which evaluates at the gate level the resistance of the circuit to a class of attacks, among them is the well-known Differential Power Analysis (DPA). This is of particular concern since it enables the designer to detect design strengths and weaknesses and to compare and choose different circuitpsilas architectures at an early stage of the design flow. The proposed methodology has been applied to different hardware models of the Advanced Encryption Standard (AES) and highlights substantial differences between the models in terms of area and security.\",\"PeriodicalId\":140550,\"journal\":{\"name\":\"2008 Ph.D. Research in Microelectronics and Electronics\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-08-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Ph.D. Research in Microelectronics and Electronics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RME.2008.4595738\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Ph.D. Research in Microelectronics and Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RME.2008.4595738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An evaluation methodology for the security of cryptosystems
This paper describes an integrated circuit design methodology which evaluates at the gate level the resistance of the circuit to a class of attacks, among them is the well-known Differential Power Analysis (DPA). This is of particular concern since it enables the designer to detect design strengths and weaknesses and to compare and choose different circuitpsilas architectures at an early stage of the design flow. The proposed methodology has been applied to different hardware models of the Advanced Encryption Standard (AES) and highlights substantial differences between the models in terms of area and security.