User menu

Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations

Bibliographic reference Kamel, Dina ; Renauld, Mathieu ; Flandre, Denis ; Standaert, François-Xavier. Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations. In: Journal of Cryptographic Engineering, , no.4, p. 1987-1995 (18/04/2014)
Permanent URL http://hdl.handle.net/2078.1/152051
  1. Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.16-29, 10.1007/978-3-540-28632-5_2
  2. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Proceedings of Cryptographic Hardware and Embedded Systems, CHES, pp. 13–28 (2002)
  3. Giga Test Labs: ARIES Electronics 64 Pin QFP (0.55 mm) Test Socket, Electrical Characterisation 0.05–3.05 GHz. Characterisation report (1997)
  4. Hassoune, I., Macé, F., Flandre, D., Legat, J.D.: Dynamic differential self-timed logic families for robust and low-power security ICs. Integration 40(3), 355–364 (2007)
  5. Iokibe K., Amano T., Okamoto K., Toyota Y., Equivalent Circuit Modeling of Cryptographic Integrated Circuit for Information Security Design, 10.1109/temc.2013.2250505
  6. Kengo Iokibe, Ryota Higashi, Takahiro Tsuda, Kouji Ichikawa, Nakamura Katsumi, Toyota Yoshitaka, Koga Ryuji, Modeling of microcontroller with multiple power supply pins for conducted EMI simulations, 10.1109/edaps.2008.4736018
  7. Kamel, D., Renauld, M., Bol, D., Standaert, F.X., Flandre, D.: Analysis of dynamic differential swing limited logic for low-power secure applications. J. Low Power Electron. Appl. 1(2), 98–126 (2012). url: http://www.mdpi.com/2079-9268/2/1/98/
  8. Li Huiyun, Markettos A. Theodore, Moore Simon, Security Evaluation Against Electromagnetic Analysis at Design Time, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.280-292, 10.1007/11545262_21
  9. Macé, F., Standaert, F.X., Quisquater, J.J.: Information theoretic evaluation of side-channel resistant logic styles. In: Paillier, P., Verbauwhede, I. (eds.) CHES, Lecture Notes in Computer Science, pp. 427–442. Springer, Berlin (2007)
  10. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks—Revealing the Secrets of Smart Cards. Springer, Berlin (2007)
  11. Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked CMOS gates. In: Menezes, A. (ed.) CT-RSA, Lecture Notes in Computer Science, pp. 351–365. Springer, Berlin (2005)
  12. Nakamura, K.: EMC macro-model (LECCS-core) for multiple power-supply pin LSI. In: Proceeding of the EMC’04, Sendai, June (2004). url: http://ci.nii.ac.jp/naid/10018460119/en/
  13. Regazzoni, F., Cevrero, A., Standaert, F.X., Badel, S., Kluter, T., Brisk, P., Leblebici, Y., Lenne, P.: A design flow and evaluation framework for DPA-Resistant instruction set extensions. In: Clavier, C., Gaj, K. (eds.) CHES, Lecture Notes in Computer Science, pp. 205–219. Springer, Berlin (2009)
  14. Regazzoni, F., Eisenbarth, T., Poschmann, A., Großschädl, J., Gürkaynak, F.K., Macchetti, M., Deniz, Z.T., Pozzi, L., Paar, C., Leblebici, Y., Ienne, P.: Evaluating resistance of mcml technology to power analysis attacks using a simulation-based methodology. Trans. Comput. Sci. 4, 230–243 (2009)
  15. Renauld, M., Kamel, D., Standaert, F.X., Flandre, D.: Information theoretic and security analysis of a 65-nanometer DDSLL AES S-Box. In: Proceedings of Cryptographic Hardware and Embedded Systems, CHES, pp. 223–239 (2011)
  16. Renauld, M., Standaert, F.X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: EUROCRYPT, pp. 109–128 (2011)
  17. Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Proceedings of Cryptographic Hardware and Embedded Systems, CHES, Springer, LNCS 3659, pp. 30–46. Springer, Berlin (2005)
  18. Standaert François-Xavier, Malkin Tal G., Yung Moti, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.443-461, 10.1007/978-3-642-01001-9_26
  19. Texas instruments: AN-1205 electrical performance of packages. Application report (2004).
  20. Tiri, K., Verbauwhede, I.: Simulation models for side-channel information leaks. In: Jr. Joyner, W.H., Martin, G., Kahng, A.B. (eds.) DAC, pp. 228–233. ACM, USA (2005)
  21. Tiri K., Verbauwhede I., A digital design flow for secure integrated circuits, 10.1109/tcad.2005.855939
  22. Veyrat-Charvillon, N., cois Xavier Standaert, F.: Generic side- channel distinguishers: Improvements and limitations. In: Advances in Cryptology—CRYPTO 2011–31st Annual Cryptology Conference, Lecture Notes in Computer Science, vol. 6841, p. 348. Springer, Berlin (2011)
  23. Whitnall, C., Oswald, E., Standaert, F.X.: The myth of generic DPA... and the magic of learning. Cryptology ePrint Archive, Report 2012/256 (2012). url: http://eprint.iacr.org/