SLIDE 52 Introduction Attacks Counter-Measures New Applications of DPA Conclusions & Perspectives The DPA Contest EveSoC: an eavesdropping SoC
References
[1] Evaluation on FPGA of Triple Rail Logic Robustness against DPA and DEMA. In DATE, track A4 (Secure embedded implementations), April 20–24 2009. Nice, France. [2] ´ Eric Brier, Christophe Clavier, and Francis Olivier. Correlation Power Analysis with a Leakage Model.
- Proc. of CHES’04, 3156:16–29, August 11–13 2004.
ISSN: 0302-9743; ISBN: 3-540-22666-4; DOI: 10.1007/b99451; Cambridge, MA, USA. [3] Sylvain Guilley, Sumanta Chaudhuri, Laurent Sauvage, Tarik Graba, Jean-Luc Danger, Philippe Hoogvorst, Ving-Nga Vong, and Maxime Nassar. Shall we trust WDDL? In Future of Trust in Computing, volume 2, Berlin, Germany, jun 2008. [4] Sylvain Guilley, Sumanta Chaudhuri, Laurent Sauvage, Tarik Graba, Jean-Luc Danger, Philippe Hoogvorst, Vinh-Nga Vong, and Maxime Nassar. Place-and-Route Impact on the Security of DPL Designs in FPGAs. In HOST, pages 29–35. IEEE Computer Society, 2008. June 9, Anaheim, USA. ISBN = 978-1-4244-2401-6. [5] Sylvain Guilley, Philippe Hoogvorst, Renaud Pacalet, and Johannes Schmidt. Improving Side-Channel Attacks by Exploiting Substitution Boxes Properties. In BFCA – http: // www. liafa. jussieu. fr/ bfca/ , pages 1–25, 2007. May 02–04, Paris, France. [6] Farouk Khelil, Mohamed Hamdi, Sylvain Guilley, Jean-Luc Danger, and Nidhal Selmane. Fault Attack on AES FPGA Encryption Platform. In NTMS, pages 1–5, Tangier, Morocco, nov 2008. [7] Thanh-Ha Le, C´ ecile Canovas, and Jessy Cl´ edi` ere. An overview of side channel analysis attacks. Sylvain GUILLEY < sylvain.guilley@TELECOM-ParisTech.fr > On the Power of Power Analyses
SECURE
52