What is it about?
Cryptography hardware is vulnerable to side-channel attacks on power supply current flow and electro-magnetic emission. This article proposes simulation-based power and EM side-channel leakage analysis techniques on a cryptographic integrated circuit chip in system level assembly.
Featured Image
Photo by Vishnu Mohanan on Unsplash
Why is it important?
Side-channel attack is a practical threat to cryptosystems. When the designers design an application specific IC chip with crypto module, they try to mitigate the vulnerability against side-channel attacks. However, it is difficult for designers to estimate the vulnerability at design stage without simulation based side-channel leakage analysis techniques. In this paper, we proposed simulation technique which is optimized for evaluationg side-channel leakage of very large-scale integration.
Perspectives
Read the Original
This page is a summary of: Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis, ACM Journal on Emerging Technologies in Computing Systems, December 2022, ACM (Association for Computing Machinery),
DOI: 10.1145/3568957.
You can read the full text:
Contributors
The following have contributed to this page