Secure Logic Styles
ECRYPT II summer school on Design and Security of Cryptographic Algorithms and Devices
- 1. June 2011
Amir Moradi
Embedded Security Group
Secure Logic Styles ECRYPT II summer school on Design and Security - - PowerPoint PPT Presentation
Embedded Security Group Secure Logic Styles ECRYPT II summer school on Design and Security of Cryptographic Algorithms and Devices 1. June 2011 Amir Moradi Embedded Security Group Agenda Power Consumption Characteristics of CMOS Circuits
ECRYPT II summer school on Design and Security of Cryptographic Algorithms and Devices
Amir Moradi
Embedded Security Group
2 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
3 Embedded Security Group
– The point that we get the “information leakage”
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
4 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
5 Embedded Security Group
[Physical-Security.org]
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
6 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
7 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
8 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
9 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
pre-charge pre-charge evaluation evaluation
To have constant power consumption, the capacitance loads of complementary signals must be the same
10 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
11 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
12 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
13 Embedded Security Group
– For example, one AND gate may make the output 0 once seeing that one input is 0
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
14 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
15 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
16 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
17 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
18 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
19 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
20 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
21 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
22 Embedded Security Group
amir.moradi@rub.de
23 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi
24 Embedded Security Group
ECRYPT II summer school | Albena | 1. June 2011 | Secure Logic Styles Amir Moradi