Microelectronics, Volume. 51, Issue 3, 351(2021)
A Novel Security Evaluation Method for Cryptographic Chip
[1] [1] KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems [C] // 16th CRYPTO. Santa Barbara, CA, USA. 1996: 104-113.
[3] [3] BIRYUKOV A, CANNIERE C D. Data encryption standard (DES) [J]. Encyclopedia Cryptography & Security, 2011, 28(2): 295-301.
[5] [5] KOCHER P C, JAFFE J, JUN B. Differential power analysis [C] // 19th CRYPTO. Santa Barbara, CA, USA. 1999: 388-397.
[6] [6] BRIER E, CLAVIER C, OLIVIER F. Correlation power analysis with a leakage model [C] // CHES. Cambridge, MA, USA. 2004: 16-29.
[8] [8] SCHNEIDER T, MORADI A. Leakage assessment methodology [J]. J Cryptographic Engineer, 2016, 6(2): 85-99.
[9] [9] IEEE standard for Verilog hardware description language: IEEE Std 1364-2005 (Revision of IEEE Std 1364-2001) [S]. IEEE, 2006.
[10] [10] GROB H, MANGARD S, KORAK T. An efficient side-channel protected AES implementation with arbitrary protection order [C] // CT-RSA. San Francisco, CA, USA. 2017: 95-112.
[11] [11] SHAN W, WANG L, LI Q, et al. A chosen-plaintext method of CPA on SM4 block cipher [C] // IEEE 10th Int Conf Computational Intelligence and Security. Kunming, China. 2014: 363-366.
Get Citation
Copy Citation Text
YANG Xue, ZHANG Chi, SHAN Weijun, WANG Lihui, LI Qing, YU Jun. A Novel Security Evaluation Method for Cryptographic Chip[J]. Microelectronics, 2021, 51(3): 351
Category:
Received: Aug. 24, 2020
Accepted: --
Published Online: Mar. 11, 2022
The Author Email: