Citation: | Yingjian Yan, Jijun Xu, Shoucheng Wang, Zhong Wang, Min Liu. Method Based on Time Randomization to Resist Fault Sensitivity Analysis[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2017, 26(3): 411-417.doi:10.15918/j.jbit1004-0579.201726.0318 |
[1] |
Li Y, Sakiyama K, Gomisawa S, et al. Fault sensitivity analysis[C]//International Workshop on Cryptographic Hardware and Embedded Systems, Santa Barbara, CA, USA, 2010.
|
[2] |
Guo X, Mukhopadhyay D, Karri R. Provably secure concurrent error detection against differential fault analysis[R]. Santa Barbara, USA:IACR Cryptology ePrint Archive, 2012:552.
|
[3] |
Karri R, Wu K, Mishra P, et al. Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers[J]. IEEE Transactions on computer-aided design of integrated circuits and systems, 2002, 21(12):1509-1517.
|
[4] |
Tiri K, Verbauwhede I. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation[C]//The Conference on Design, Automation and Test in Europe, Paris, France, 2004.
|
[5] |
Popp T, Mangard S. Masked dual-rail pre-charge logic:DPA-resistance without routing constraints[C]//International Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, UK, 2005.
|
[6] |
Chang Xiaolong, Ding Guoliang, Wu Cuixia, et al. Design of AES S-box against electromagnetic side-channel attacks[J]. Computer Engineering, 2011, 37(17):93-95. (in Chinese)
|
[7] |
Moradi A, Mischke O, Paar C, et al. On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting[C]//International Workshop on Cryptographic Hardware and Embedded Systems, Nara, Japan, 2011.
|
[8] |
Saeki M, Suzuki D, Shimizu K, et al. A design methodology for a DPA-resistant cryptographic LSI with RSL techniques[C]//International Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, Switzerland, 2009.
|
[9] |
Satoh A, Morioka S, Takano K, et al. A compact Rijndael hardware architecture with S-box optimization[C]//International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, 2001.
|
[10] |
Ghalaty N F, Aysu A, Schaumont P. Analyzing and eliminating the causes of fault sensitivity analysis[C]//Design, Automation and Test in Europe Conference and Exhibition, Dresden, Germany, 2014.
|
[11] |
Mischke O, Moradi A, Güneysu T. Fault sensitivity analysis meets zero-value attack[C]//The Workshop on Fault Diagnosis and Tolerance in Cryptography, Busan, Korea, 2014.
|
[12] |
Endo S, Li Y, Homma N, et al. A silicon-level countermeasure against fault sensitivity analysis and its evaluation[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2015, 23(8):1429-1438.
|
[13] |
Wang Pengjun, Hao Lipeng, Zhang Yuejun. Design of AES SubByte module of anti-zero value power attack and its VLSI implementation[J]. Acta Electronica Sinica, 2012, 40(11):2183-2187. (in Chinese)
|