9 |
TIRI K, AKMAL M, VERBAUWHEDE I. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards[C]// Proceedings of the 28th European Solid-State Circuits Conference. Florence: IEEE, 2002: 403-406.
|
10 |
王晨旭. 密码芯片抗功耗攻击技术研究[D]. 哈尔滨: 哈尔滨工业大学, 2013. WANG C X. Research on the Power Analysis Resistant Technology of Cryptographic IC[D]. Harbin: Harbin Institute of Technology, 2013.
|
11 |
SHINU P, DINESH KUMAR P. Design of delay based dual rail precharge logic to reduce DPA attacks[C]// 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). Nagercoil: IEEE, 2012: 552-556. DOI:10.1109/ICCEET.2012.6203865
doi: 10.1109/ICCEET.2012.6203865
|
12 |
BRONCHAIN O, STANDAERT F X. Side-channel countermeasures' dissection and the limits of closed source security evaluations[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020(2): 1-25. doi:10.46586/tches.v2020.i2.1-25
doi: 10.46586/tches.v2020.i2.1-25
|
13 |
RABAEY J M. Digital Integrated Circuits: A Design Perspective[M]. Upper Saddle River: Prentice Hall, 1996.
|
14 |
TIRI K, VERBAUWHEDE I. A VLSI design flow for secure side-channel attack resistant ICs[C]// Design, Automation and Test in Europe. Munich: IEEE, 2005: 58-63.
|
15 |
WONG D C, de MICHELI G, FLYNN M J. Designing high-performance digital circuits using wave pipelining: Algorithms and practical experiences[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1993, 12(1): 25-46. DOI:10.1109/43.184841
doi: 10.1109/43.184841
|
16 |
闫石, 王红. 数字电子技术基础[M]. 北京: 高等教育出版社, 2016. YAN S, WANG H. Fundamentals of Digital Electronic Technology [M]. Beijing: Higher Education Press, 2016.
|
17 |
DELGADO-LOZANO I M, TENA-SÁNCHEZ E, NÚÑEZ J. Projection of dual-rail DPA countermeasures in future FinFET and emerging TFET technologies[J]. ACM Journal on Emerging Technologies in Computing Systems, 2020, 16(3):1-16. doi:10.1145/3381857
doi: 10.1145/3381857
|
18 |
SHEN J Z, GENG L, ZHANG F. Dynamic current mode logic based flip-flop design for robust and low-power security integrated circuits[J]. Electronics Letters, 2017, 53(18): 1236-1238. DOI:10.1049/el.2017.2415
doi: 10.1049/el.2017.2415
|
19 |
DE P, PARAMPALLI U, MANDAL C. Secure path balanced BDD-based pre-charge logic for masking[J]. IEEE Transactions on Circuits and Systems, 2020, 67(12): 4747-4760. DOI:10.1109/TCSI.2020.3019921
doi: 10.1109/TCSI.2020.3019921
|
20 |
姚茂群,周传鑫.基于阈算术代数系统的电流型BiCMOS多值加法器设计[J].杭州师范大学学报(自然科学版),2018,17(5):549-554.
|
1 |
KOCHER P, JAFFE J, JUN B. Differential power analysis[C]// Advances in Cryptology-CRYPTO ′99. California: Springer, 1999: 388-397. doi:10.1007/3-540-48405-1_25
doi: 10.1007/3-540-48405-1_25
|
2 |
SAFTA M, SVASTA P, DIMA M, et al. Design and setup of power analysis attacks[C]// 2016 IEEE 22th International Symposium for Design and Technology in Electronic Packaging (SIITME). Oradea: IEEE, 2016: 110-113. DOI:10.1109/SIITME.2016.7777256
doi: 10.1109/SIITME.2016.7777256
|
3 |
XU J, HEYS H M. Template attacks of a masked S-Box circuit: A comparison between static and dynamic power analyses[C]// 2018 IEEE 16th International New Circuits and Systems Conference (NEWCAS). Montreal: IEEE, 2018: 277-281. DOI:10.1109/NEWCAS.2018.8585541
doi: 10.1109/NEWCAS.2018.8585541
|
4 |
SICHANI A S, MORENO W A. Mathematical model for glitch power consumption to study its implication on power analysis attacks[C]// 2018 IEEE 9th Latin American Symposium on Circuits & Systems (LASCAS). Puerto Vallarta: IEEE, 2018: 1-4. DOI:10.1109/LASCAS.2018.8554090
doi: 10.1109/LASCAS.2018.8554090
|
5 |
UTYAMISHEV D, PARTIN-VAISBAND I. Real-time detection of power analysis attacks by machine learning of power supply variations on-chip[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, 39(1): 45-55. DOI:10.1109/TCAD.2018.2883971
doi: 10.1109/TCAD.2018.2883971
|
6 |
HUANG W L, CHEN J P, YANG B Y. Power analysis on NTRU prime[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020(1): 123-151. DOI:10.13154/tches.v2020.i1.123-151
doi: 10.13154/tches.v2020.i1.123-151
|
7 |
乐大珩. 抗功耗攻击的密码芯片电路级防护关键技术研究[D]. 长沙: 国防科学技术大学, 2011. YUE D H. Research on Circuit-Level Design Against Power Analysis Attack for Cryptographic Chip[D]. Changsha: Notional University of Defense Technology, 2011.
|
8 |
TIRI K, VERBAUWHEDE I. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation[C]// Design, Automation and Test in Europe. Paris: IEEE, 2004: 246-251. DOI:10.5555/968878.969036
doi: 10.5555/968878.969036
|
20 |
YAO M Q, ZHOU C X. “Design of current-mode BiCMOS multiple-valued adder based on threshold-arithmetic algebraic system[J].Journal of Hangzhou Normal University (Natural Science Edition), 2018, 17(5):549-554.
|
21 |
TIRI K, VERBAUWHEDE I. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation[C]// Proceedings Design, Automation and Test in Europe Conference and Exhibition. Paris: IEEE, 2004, 1: 246-251.
|
22 |
李立威. 防御逆向攻击的逻辑混淆电路设计[D]. 宁波: 宁波大学, 2019. doi:10.15407/mag15.03.369 LI L W. Design of Logic Obfuscation Circuit for Defending Reverse Attack[D]. Ningbo: Ningbo University, 2019. doi:10.15407/mag15.03.369
doi: 10.15407/mag15.03.369
|
23 |
乐大珩, 李少青, 张民选. 基于LBDL逻辑的抗DPA攻击电路设计方法[J]. 国防科技大学学报, 2009, 31(6): 18-24. DOI:10.3969/j.issn.1001-2486.2009.06.004 YUE D H, LI S Q, ZHANG M X. An LBDL based VLSI design method to counteract DPA attacks[J]. Journal of National University of Defense Technology, 2009, 31(6): 18-24. DOI:10.3969/j.issn.1001-2486.2009.06.004
doi: 10.3969/j.issn.1001-2486.2009.06.004
|