sensingnanosim剪卡

nanosim剪卡  时间:2021-01-17  阅读:()
F.
Bouesse,M.
Renaudin,G.
Sicard26av.
FélixViallet,38031GrenobleCedexfraidy.
bouesse@imag.
frAbstract.
ThepurposeofthispaperistoproposeadesigntechniqueforimprovingtheresistanceoftheQuasiDelayInsensitive(QDI)AsynchronouslogicagainstDifferentialPowerAnalysisAttacks.
ThiscountermeasureexploitsthepropertiesoftheQDIcircuitacknowledgementsignalstointroducetemporalvariationssoastorandomlydesynchronizethedataresistance,isformallypresentedandanalyzed.
ElectricalsimulationsperformedonaDEScrypto-processorconfirmtherelevancyoftheapproach,showingadrasticreductionoftheDPApeaks,thusincreasingthecomplexityofaDPAattackonQDIasynchronouscircuits.
1IntroductionandmotivationsNowadays,thepossibilitiesofferedbyallrecentpowerfulside-channelattackstoaccesstoconfidentialinformation,constrainsecuresystemsproviderstodevelopnewresistantsystemsagainsttheseattacks.
Amongthesenewhardwarecryptanalysisattacks,thereistheDifferentialPowerAnalysis(DPA)whichisoneofexistsacorrelationbetweendataprocessedbythedesignandtheobservablepowerItisinthiscontextthatthepropertiesofSelf-timedlogichavebeenexploitedinordertoproposeefficientcounter-measuresagainstDPAattacks[2][3].
Insensitiveasynchronouslogicdemonstratedthepotentialityofthistypeoflogictoincreasethechip'sresistance[4][5].
themostpowerfulandlowcostattack.
ThemainideabehindDPAisthatthereexploitedusingstatisticalmeanstoretracesecretkeyinformation.
AllresultsfromtheanalysisofSelf-timedlogicparticularlytheQuasiDelaySpringer),pp.
11–24.
ImprovingDPAResistanceofQuasiDelayprocessingtimes.
Theefficiencyofthecountermeasure,intermsofDPAshiftedAcknowledgmentSignalsTIMALaboratory,ConcurentIntegratedSystemsGroupBouesse,F.
,Renaudin,M.
,Sicard,G.
,2007,inIFIPInternationalFederationforInformationProcessing,Volume240,VLSI-SoC:FromSystemstoSilicon,eds.
Reis,R.
,Osseiran,A.
,Pfleiderer,H-J.
,(Boston:consumption.
In1998PaulKocher[1]demonstratedhowthiscorrelationcanbeInsensitiveCircuitsUsingRandomlyTime-However,paper[6]reportedthat,eveniftheQDIasynchronouslogicincreasestheresistanceofthechip,therestillexistssomeresidualsourcesofleakagethatcanbeusedtosucceedtheattack.
TheobjectiveofthispaperistomakeaDPAattackimpossibleorimpracticablewithstandardequipmentbyincreasingthecomplexityoftheattack.
Fordoingso,weintroducerandomlytimeshifted(RTS)acknowledgmentsignalsintheQDIasynchronouslogicinordertoaddnoiseinchip'spowerconsumption.
Indeed,theuseofaRTSacknowledgementsignalinanasynchronousQuasiDelayInsensitiveblockenablesustodesynchronizethedataprocessingtime,soastocomputetheblocks'outputchannelsatrandomtimes.
AstheDPAattackrequiresthesignalstobesynchronizedwithrespecttoafixedtimeinstantfordataanalysis[1][7],thisdesynchronizationmakestheDPAattackmoredifficultasitisprovedinthispaper.
Wepresentinthefirstpartofthepaper(section2),thepropertiesofQuasiDelayInsensitiveasynchronouslogic,especiallythepropertiesoftheacknowledgmentsignal.
Section3firstintroducestheformalanalysisoftheDPAattack.
ItthenpresentsthedesynchronizationtechniquebasedonRTSacknowledgementsignalsandformalizesitsefficiencyintermsofDPAresistance.
Finally,sections4and5illustratethetechniqueusingelectricalsimulationsperformedonthewellknownDataEncryptionStandard(DES)architecture.
Section6concludesthepaperandgivessomeprospects.
2QuasiDelayInsensitiveAsynchronouslogic:theacknowledgmentsignalThissectionrecallsthebasiccharacteristicsofanasynchronouscircuit,particularlytheruleoftheacknowledgementsignalintheQDIasynchronouslogic.
Becausethistypeofcircuitdoesnothaveaglobalsignalwhichsamplesthedataatthesametime,asynchronouscircuitsrequireaspecialprotocoltoperformacommunicationbetweenitsmodules.
Thebehaviorofanasynchronouscircuitissimilartoadata-flowmodel.
Theasynchronousmodule,asdescribedinfigure1andwhichcanactuallybeofanycomplexity,receivesdatafromitsinputchannels(requestsignal),processesthem,andthensendstheresultsthroughitsoutputchannels.
Therefore,amoduleisactivatedwhenitsensesthepresenceofincomingdata.
Thispoint-to-pointcommunicationisrealizedwithaprotocolimplementedinthemoduleitself.
Suchprotocolsnecessitateabi-directionalsignalingbetweenbothmodules(requestandacknowledgement):itiscalledhandshakingprotocols.
12F.
Bouesse,M.
Renaudin,G.
SicardFig.
1.
Handshakebasedcommunicationbetweenmodules.
Thebasisofthesequencingrulesofasynchronouscircuitsliesinthehandshakingprotocols.
Amongthetwomainsclassesofprotocols,onlythefour-phaseprotocolisconsideredanddescribedinthiswork.
ItisthemostwidelyusedandefficientlyimplementedinCMOS[8].
Fig.
2.
Four-phasehandshakingprotocol.
Inthefirstphase(Phase1)dataaredetectedbythereceiverwhentheirvalueschangefrominvalidtovalidstates.
Thenfollowsthesecondphasewherethereceiversetstoonetheacknowledgementsignal.
Thesenderinvalidatesalldatainthethirdphase.
Finallythereceiverresetstheacknowledgmentsignalwhichcompletesthereturntozerophase.
Dedicatedlogicandspecialencodingarenecessaryforsensingdatavalidity/invalidityandforgeneratingtheacknowledgementsignal.
Requestforcomputationcorrespondstodatadetectionandtheresetoftheacknowledgmentsignalmeansthatthecomputationiscompletedandthecommunicationisfinished.
InQDIasynchronouslogic,ifonebithastobetransferredthroughachannelwithafour-phaseprotocol,twowiresareneededtoencodeitsdifferentvalues.
Thisiscalleddual-railencoding(table1).
13ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsTable1.
Dualrailencodingofthethreestatesrequiredtocommunicate1bit.
ChanneldataA0A1010101Invalid00Unused11ThisencodingcanbeextendedtoN-rail(1-to-N).
Theacknowledgementsignalisgeneratedusingthedata-encoding.
Thedual-railencodedoutputsaresensedwithNorgatesforgeneratingtheacknowledgmentsignal,asillustratedinfigure3.
Fig.
3.
1-bitHalf-bufferimplementingafour-phaseprotocol(CrisaMullergatewitharesetsignal)TheMullerC-element'struthtableandsymbolaregiveninFigure4.
Fig.
4.
TruthtableandsymboloftheC-element.
Figure3illustratestheimplementationoftwoasynchronousmodules(AandB)withtheirmemoryelementscalledhalf-buffer.
Thehalf-bufferimplementsafour-phaseprotocol.
WhentheacknowledgementsignalofmoduleB(B_ack)isset,itmeansthatthemoduleisreadytoreceivedata.
IfadataistransferredfrommoduleAtomoduleB,moduleBcomputesitsoutputsandresetsitsacknowledgementsignal(B_ack).
ModuleBisthenreadytoreceiveinvaliddatafrommoduleA.
14F.
Bouesse,M.
Renaudin,G.
SicardInthisoperatingmode,theacknowledgmentsignalcanbeconsideredasalocalenablesignalwhichcontrolsdatastoragelocally.
Notethatthismechanismdoesnotneedanytimingassumptiontoensurefunctionalcorrectness;itissimplysensitivetoevents.
Hence,theacknowledgmentsignalenablestocontroltheactivationofthecomputationinagivenmodule,aswellasitstimeinstant.
Thetechniqueproposedinthispaper,exploitsthispropertybyinsertingrandomdelaysintheacknowledgementsignals.
ItiscalledRandomlyTime-Shiftedacknowledgmentsignals.
Itbasicallydesynchronizesthepowerconsumptioncurvesmakingthedifferentialpoweranalysismoredifficultasprovedinthenextsection.
3DPAandRTSacknowledgmentsignalonQDIasynchronouscircuits:FormalApproachInthissection,weformallyintroducethebasisoftheDPAattack[7]andformallyanalysetheeffectsoftheRTSacknowledgementsignalonQDIasynchronouscircuitsintermsofDPAresistance.
3.
1DifferentialPowerAnalysisAttackThefunctionalhypothesisofDPAattackistheexistingcorrelationbetweenthedataprocessedbythecircuitryanditspowerconsumption.
TherearethreemainphasesforprocessingtheDPAattack:thechoiceoftheselectionfunctionD,thedatacollectionphaseandthedataanalysisphase.
Phase1:Inthefirststep,theselectionfunctionisdefinedbyfindingblocksinthearchitecturewhichdependonsomepartsofthekey.
SuchafunctionintheDESalgorithmforexamplecanbedefinedasfollows:D(C1,P6,K0)=SBOX1(P6K0)C1=firstbitofSBOX1function.
P6=6-bitplain-text-inputoftheSBOX1function.
K0=6-bitofthefirstround'ssubkey:keytoguess.
SBOX1=asubstitutionfunctionofDESwitha4-bitoutput.
Phase2:ThesecondstepconsistsincollectingthediscretetimepowersignalSi(tj)andthecorrespondingciphertextoutputs(CTOi)foreachoftheNplaintextinputs(PTIi).
ThepowersignalSi(tj)representsthepowerconsumptionoftheselectionfunction:indexicorrespondstothePTIiplaintextstimulusandtimetjcorrespondstothetimewheretheanalysistakesplace.
Phase3:Therightkeyisguessedinthethirdphase.
AllcurrentsignalsSi(tj)aresplitintotwosetsaccordingtoaselectionfunctionD.
15ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsTheaveragepowersignalofeachsetisgivenby:Where|no|and|n1|representthenumberofpowersignalsSi(tj)respectivelyinsetS0andS1.
TheDPAbiassignalisobtainedby:IftheDPAbiassignalshowsimportantpeaks,itmeansthatthereisastrongcorrelationbetweentheDfunctionandthepowersignal,andsotheguessedkeyiscorrect.
Ifnot,theguessedkeyisincorrect.
SelectinganappropriateDfunctionisthenessentialinordertoguessagoodsecretkey.
Asillustratedabove,theselectionfunctionDcomputesattimetjduringtheciphering(ordeciphering)process,thevalueoftheattackedbit.
Whenthisvalueismanipulatedattimetj,therewillbeatthistime,adifferenceontheamountofdissipatedpoweraccordingtothebit'svalue(eitheroneorzero).
Let'sdefined0i(tj)theamountofdissipatedpowerwhentheattackedbitswitchesto0attimetjbyprocessingtheplaintextinputianddefined1i(tj)theamountofdissipatedpowerwhenthisbitswitchesto1.
Inreality,thevaluesofd0i(tj)andd1i(tj)correspondtothedissipatedpowerofalldata-pathswhichcontributetotheswitchingactivityoftheattackedbit.
EachoneofthesevalueshasitsweightineachaveragepowersignalA0(tj)andA1(tj).
AsthegoaloftheDPAattackistocomputethedifferencebetweenthesetwovalues,wecanexpresstheaveragepowersignalofthesebothsetsA0(tj)andA1(tj)by:(1)(3)(4)(2)(4)16F.
Bouesse,M.
Renaudin,G.
SicardInordertomakeanefficientanalysis,theamplitudeoftheDPAsignatureε(tj)mustbeashighaspossible.
Asimplewaytoguaranteethisistouseasignificantnumberofplaintextinputs(N).
Indeed,thenumberofPTIi(thenumberofpowersignalSi(tj))usedtoimplementtheattackenablestoreducetheeffectsofthenoisysignalsandtoincreasetheprobabilityofexcitingalldata-paths.
Itiswellknownthatthesignal-to-noiseratiofortheaveragedsignalincreasesasthesquarerootofthenumberofcurves.
σnoiseisthestandarddeviationofthenoiseIncreasingthenumberofplaintextinputs(PTIi)allowsustoensurethatalldata-pathswhichmakeswitchingto0orto1theattackedbitareexcited.
Thedealhere,istotakeintoconsiderationallpossiblequantitiesdxi(tj)whichrepresenttheswitchingcurrentoftheattackedbit.
Astheprobabilityofexcitingalldata-pathsisproportionaltoN,biggerthevalueofN,bettertheprobabilitytoexcitealldata-pathsoftheattackedbitis:misgenerallyunknownbythehackerandrepresentsthenumberofdata-paths.
Therefore,theknowledgeoftheimplementationwhichenablestochoosetheplaintextinputsandtheuseofhighqualityinstrumentationareassetsthatimprovetheDPAattack.
Infact,theyconsiderablyreducethenumberofdata(N)requiredforsucceedingtheattack.
3.
2TheRTSacknowledgementsignalThemethodweproposeinthispaperenablesthedesignertointroduceatemporalnoiseinthedesigninordertodesynchronizethetimerequiredforprocessingtheattackedbit.
Theideaoftheapproachistorandomlyshiftintimethecurrentprofileofthedesign.
Toachievethisgoal,werandomizetheacknowledgmentsignallatencyoftheblocksofthearchitecture.
Asillustratedinfigure5,weuseadelayelementcontrolledbyarandomnumbergenerator.
Thedesignoftherandomnumbergeneratorisoutofthescopeofthispaper.
True(5)17ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsTherefore,theDPAsignatureisexpressedby:randomnumbergenerator(TRNG)designisanimportanttopicandmanydifferenttypesofTRNGimplementationexist[9][10].
Fig.
5.
ImplementationofarandomacknowledgmentsignalLet'sdenotenthenumberofpossiblerandomdelaysimplementedinagivenarchitecture.
ndependsonthenumberofavailableacknowledgmentsignals(m)inthearchitectureandonthenumberofdelays(ki)implementedperacknowledgmentsignal.
The"n"valueiscomputedbythefollowingexpression:assumingcascadedmodules.
Iftheacknowledgmentsignalisrandomizedntimes,itmeansthatthevalueoftheattackedbitiscomputedatndifferenttimes(tj).
N/nrepresentsthenumberoftimestheattackedbitisprocessedatagiventimetjandN/2nrepresentsthenumberoftimesthequantitiesd0i(tj)andd1i(tj)ofthisbitcontributetosetS0andS1respectively.
IfweconsiderthattheNcurvesareequallysplitinbothsets(n0=n1=N/2),theaveragepowersignalofeachsetisnowexpressedby:TheDPAbiassignalisthengivenbythefollowingexpression:with;6)(6)18F.
Bouesse,M.
Renaudin,G.
SicardTheseexpressionsshowthat,insteadofhavingasinglequantityεx(tj),wehavendifferentsignificantquantitiesεx(tn)whichcorrespondtontimeswheretheattackedbitisprocessed.
Moreover,italsodemonstratesthateachquantityεx(tj)isdividedbyafactornasillustratedbythefollowingsimplification:withItmeansthat,althoughthenumberofsignificantpointsisincreasedbyn,thisapproachdividesbyntheaveragecurrentpeaksvariations.
ItoffersthepossibilitytobringdownthelevelofDPAbiassignalclosertocircuitry'snoise.
3.
2DiscussionLet'sforexampleimplementtheDPAattackusing1000plaintextinputs(N=1000).
Inthestandardapproachwheretheattackedbitisprocessedatauniquegiventime,weobtainanaverageof500currentcurvesforeachofthesetsS0andS1.
UsingourapproachwithRTSacknowledgmentsignalsandassumingn=16(forexample),weobtain16differentpoints(intermsoftime)wheretheattackedbitisprocessed.
Thereare62valuesdxi(tj)(N/ncurves)wherethisbitisprocessedattime(tj).
Eachsetthencontains31curves.
Whentheaveragepowersignalofeachsetiscalculated,valuesdxi(tj)are16timeslowerthanwithoutRTSacknowledgmentsignals.
Hence,thecontributionofdxi(tj)incurrentpeaksvariationsarereducedbyafactor16.
Therefore,tosucceedtheattackthehackerisobligedtosignificantlyincreasethenumberofacquisitions(N)ortoapplyacross-correlationfunctionwhichisexactlythegoaltoachieveintermsofattack'scomplexity.
Infact,cross-correlationremainsausefulmethodforsynchronizingdata.
Buttobefunctional,thehackermustidentifytheamountofcurrentprofileoftheattackedbit(dxi(tj))tobeusedasareference,andthencomputecross-correlationsinordertosynchronizeeachoftheNcurveswiththereference.
Knowingthat,thecross-correlationisappliedoninstantaneouscurrentcurveswhichcontainsignificantquantityofnoise.
Toincreasethedifficultyofthisanalysis,thevalueofncanbesignificantlyincreasedbydealingwiththevaluesofmandk.
Thevalueofmdependsonthearchitecture.
Itsvaluecanbeincreasedbyexpandingtheacknowledgmentsignalsofthearchitecture.
Eachbitorintermediatevalueofthedesigncanbeseparatelyacknowledged.
Thistechniqueenablesalsotoreducethedata-pathlatency.
(7)(8)19ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsThevaluesofthedelaydependonthetimespecificationtocipher/decipherdata.
Theyareboundedbythemaximumciphering/decipheringtime.
Consequently,theacknowledgementsignalsofanyasynchronousquasidelayinsensitivecircuitcanbeexploitedtointroducerandomdelaysandthereforeincreasetheDPAresistanceofthechips.
4CaseStudy:DESCrypto-processorThissectiondealswiththedifferentpossibilitiesofimplementingRTSacknowledgmentsignalsonQDIasynchronouscircuits.
TheDESwaschosenasanevaluationvectorbecausetheattackonthisalgorithmiswellknown.
Figure6representstheDEScorearchitecture,implementingafour-phasehandshakeprotocol,using1-to-Nencodeddataandbalanceddata-paths[2].
Thearchitectureiscomposedofthreeiterativeasynchronousloopssynchronizedthroughcommunicatingchannels.
Oneloopforthecipheringdata-path,thesecondforthekeydata-pathandthelastoneforthecontroldata-pathwhichenablesthecontrolofthesixteeniterationsofthealgorithm.
Forexamplelet'sapplythetechniquetothefivegreyblocksoffigure6.
Eachblockhasitsownacknowledgementsignalandthedelayinsertedineachacknowledgmentsignalcantakefourvalues.
Therefore,thereare1024possibledelayvalues(n=1024).
Itmeansthat(intermsofDPAresistance)thecurrentpeakvariationscorrespondingtodxi(tj)willbedividedby1024.
Fig.
6.
AsynchronousDEScorearchitecture20F.
Bouesse,M.
Renaudin,G.
Sicard5ResultsandAnalysis:ElectricalsimulationsElectricalsimulationsenableustoanalyzetheelectricalbehaviourofthedesignwithhighaccuracy,i.
e.
withoutdisturbingsignal(noise).
AllelectricalsimulationsareperformedwithNanosimusingtheHCMOS9designkit(0.
13!
m)fromSTMicroelectronics.
Thearchitectureusedfortheseelectricalanalysisimplementsoneacknowledgementsignalperblock.
However,fortheneedsofillustrationonlytheacknowledgmentsignaloftheinputsoftheSBOX1israndomlydelayedwith8differentdelays.
Thedefinedselectionfunction,usedtoimplementtheattack,isasfollows:D(Cn,P6,K0)=SBOX1(P6K0)withn∈{1,2,3,4}TheDPAattackhasbeenimplementedonthefouroutputbitsoftheSBOX1andonthefirstiterationoftheDESalgorithmusing64plaintextinputs(N=64).
Figure7showsthecurrentprofileofthefirstiterationwhentheRTSacknowledgmentsignalisactivatedanddeactivated.
Whenthedelayof13nsisused,thetimerequiredforprocessinganiteration(figure7-b)correspondstothetimerequiredtoprocess3iterationswithoutdelays(figure7-a).
Hencethecipheringtimeismultipliedbyafactor3.
Thisdelayischosenforthesakeofillustrationonly.
GivenalevelofDPAresistance,thedelaycanbestronglydecreasedinpractice(downtoafewnanosecondswiththistechnology)toreduceasmuchaspossiblethetimingoverheadaswellasthehardwareoverheadcausedbytheapplicationofthetechniqueFig.
7.
CurrentprofileoftheDESQDIasynchronousarchitecture.
21ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsOnlythefirstiterationsareconsideredb-withacorrectguessedkeyFig.
8.
ElectricalsignatureswhenperformedDPAattackonbit4oftheSBOX1.
Onlythefirstroundisconsideredandcomputedusingmorethan2.
100.
000point.
AstheSBOX1hasfouroutputbitsencodedindual-rail,wehave8data-paths(fromoutputstoinputs)whichenabletocompute8valuesofdxi(tj).
Let'srecallthat,dxi(tj)(d0i(tj);d1i(tj))correspondstotheamountofdissipatedpowerwhentheattackedbitisprocessedattimetj.
Forexample,let'sconsidertheoutputbit4oftheSBOX1.
Contrarytoastandardapproachandduetothe8delayshifts,thevaluesd04(tj)andd14(tj)areprocessed4timesinsteadofbeingprocessed32times,sothattheirweightsarereducedbyafactor8intosetsS1andS0.
EachofthissetenablesustocalculatetheaveragecurrentsΑ0(tj)andΑ1(tj).
22F.
Bouesse,M.
Renaudin,G.
SicardFigure8showstheseaveragecurrentprofiles(A0(tj)andA1(tj))whichareusedtocomputetheDPAbiassignal(S(tj)),alsoshowninfigure8.
PartIofthesecurvesrepresentthefirstencryptionoperationsinthefirstiteration(seefigure8).
ThispartisnotaffectedbytheRTSacknowledgmentsignalwhichisonlyappliedonSBOX1.
Infact,beforecomputingtheSBOXfunction,thechipfirstcomputesIP,ExpansionandXor48functions(figure6),sothat,inthefirstiteration,thesefunctions,arenotaffectedbytheRTSacknowledgementsignalofSBOX1.
ThisexplainswhytheamplitudeoftheaveragepowercurvestartsdecreasingafterpartIanditclearlyillustratestheeffectoftheRTSsignalonthepowercurves.
ThiscanofcoursebechangedbyactivatingtheRTSacknowledgementsignalsofblocksIP,Expansionand/orXor48.
Intheconsideredexample,64PTIicurvesareusedtoimplementtheattack.
Inthiscase,obtainingthekeybitfromtheDPAbiassignalisimpossibleasshowninfigure8.
Indeed,thereisnorelevantpeakintheDPAcurrentcurves(figure8-aand8-b).
6ConclusionThispaperpresentedacountermeasureagainstDPAbasedonrandomlytime-shiftedacknowledgmentsignalsofasynchronousQDIcircuits.
Theefficiencyofthecountermeasurewasfirsttheoreticallyformalizedandthendemonstratedusingelectricalsimulations.
ThetechniqueprinciplewasillustratedonaDESarchitecture.
generator.
7ReferencesM.
Wienered.
,Springer-Verlag,1999.
23ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsCryptology-Crypto99Proceedings,LectureNotesInComputerScienceVol.
1666,FutureworkswillbefocusedonthedesignandfabricationofaDESprototypeApril2002.
Manchester,U.
K.
implementingtheRTSacknowledgementsignalstogetherwitharandomnumberTemple,"SPA-ASynthesisableAmuletCoreforSmartcardApplications",ProceedingsoftheEighthInternationalSymposiumonAsynchronousCircuitsandbytheIEEEComputerSociety.
Systems(ASYNC2002).
Pages201-210.
Manchester,8-11/04/2002.
Published"ImprovingSmartCardSecurityusingSelf-timedCircuits",EighthInter-pp137-151,2003.
nationalSymposiumonAsynchronousCircuitsandsystems(ASYNC2002).
8-112.
SimonMoore,RossAnderson,PaulCunningham,RobertMullins,GeorgeTaylor,3.
L.
A.
Plana,P.
A.
Riocreux,W.
J.
Bainbridge,A.
Bardsley,J.
D.
GarsideandS.
4.
JacquesJ.
AFournier,SimonMoore,HuiyunLi,RobertMullins,andGerorge1.
P.
Kocher,J.
Jaffe,B.
Jun,"DifferentialPowerAnalysis,"AdvancesinTaylor,"SecurityEvalutionofAsunchronousCircuits",CHES2003,LNCS2779,5.
F.
Bouesse,M.
Renaudin,B.
Robisson,EBeigne,P.
Y.
Liardet,S.
Prevosto,J.
SystemsBordeaux,France,November24-26,2004.
2523,Springer,Berlin,Germany,ISBN3-540-00409-2,pp.
415-430.
3203,Springer,Berlin,Germany,pp.
555-564.
24Sonzogni,"DPAonQuasiDelayInsensitiveAsynchronouscircuits:ConcreteF.
Bouesse,M.
Renaudin,G.
SicardChicago,Illinois,USE,May10-11,1999.
AnalysisAttacksonSmartcards",USENIXWorkshoponSmartcardTechnology,8.
MarcRenaudin,"Asynchronouscircuitsandsystems:apromisingdesignResults",TobepublishedinXIXConferenceonDesignofCircuitsandIntegratedandmobility"(MIGAS2000),specialissueoftheMicroelectronics-EngineeringJournal,ElsevierScience,GUESTEditors:P;Senn,M.
Renaudin,J,Boussey,Vol.
6.
G.
F.
Bouesse,M.
Renaudin,S.
Dumont,F.
Germain,DPAonQuasiDelayHardwareandEmbeddedSystems(CHES2002),RedwoodShore,USA,LNCSNo.
RandomNumberGeneratorinAlteraStratixFPLDs,inJ.
Becker,M.
Platzner,S.
InsensitiveAsynchronousCircuits:FormalizationandImprovement,DATE2005.
Vernalde(Eds.
):"Field-ProgrammableLogicandApplications,"14thInternational54,N°1-2,December2000,pp.
133-149.
Conference,FPL2004,Antwerp,Belgium,August30-September1,2004,LNCSReconfigurableHardware,InC.
K.
Ko,andC.
Paar,(Eds.
):Cryptographicp.
4247.
T.
S.
MessergesandE.
A.
Dabbish,R.
H.
Sloan,"InvestigationsofPower9.
ViktorFischer,M.
Drutarovsk,TrueRandomNumberGeneratorEmbeddedinalternative",MicroelectronicforTelecommunications:managinghighcomplexity10.
V.
Fischer,M.
Drutarovsk,M.
imka,N.
Bochard,HighPerformanceTrue

Friendhosting,美国迈阿密机房新上线,全场45折特价优惠,100Mbps带宽不限流量,美国/荷兰/波兰/乌兰克/瑞士等可选,7.18欧元/半年

近日Friendhosting发布了最新的消息,新上线了美国迈阿密的云产品,之前的夏季优惠活动还在进行中,全场一次性45折优惠,最高可购买半年,超过半年优惠力度就不高了,Friendhosting商家的优势就是100Mbps带宽不限流量,有需要的朋友可以尝试一下。Friendhosting怎么样?Friendhosting服务器好不好?Friendhosting服务器值不值得购买?Friendho...

青果云(59元/月)香港多线BGP云服务器 1核 1G

青果云香港CN2_GIA主机测评青果云香港多线BGP网络,接入电信CN2 GIA等优质链路,测试IP:45.251.136.1青果网络QG.NET是一家高效多云管理服务商,拥有工信部颁发的全网云计算/CDN/IDC/ISP/IP-VPN等多项资质,是CNNIC/APNIC联盟的成员之一。青果云香港CN2_GIA主机性能分享下面和大家分享下。官方网站:点击进入CPU内存系统盘数据盘宽带ip价格购买地...

Virmach:1核/512M1核M1核512M/夏季美国vps促销,年付$7.2,9月更换AMD平台

virmach怎么样?virmach家这几年非常火,从商家的黑五闪购开始,以超低的价格吸引了大批的国人客户,而且商家的机器还是非常稳定的,站长手里的4.75刀年付已经用了两年了,非常稳定,不过商家到国内的线路一般,目前商家新上了夏季优惠促销,价格低到发指,年付7.2美元起,商家反馈将在9月开始更换AMD+NVMe平台,这个消息从年初就有了,不过一直没有更换,目前这个时间也不确定是否准确。点击进入:...

nanosim剪卡为你推荐
独立ip空间如何设置独立IP加到现有空间已备案域名查询怎样知道一个网站是不是真的已经备案?域名购买域名注册和购买是一个意思吗?免备案虚拟空间虚拟免费空间网站怎么备案100m虚拟主机万网和新网虚拟主机有100M的吗上海虚拟主机谁能告诉我杭州哪个公司的虚拟主机最好,机房最好是上海或浙江的.asp虚拟主机怎样查看虚拟主机是支持ASP还是PHP程序的美国虚拟主机购买我公司需要购买美国的虚拟主机。但是为什么有的海外主机很便宜!有的却很贵呢。 质量如何区分!有没办法去新加坡虚拟主机新加坡虚拟主机无法访问,Godaddy回邮件说是域名的问题?安徽虚拟主机合肥金马网络科技有限公司怎么样?
net主机 网络星期一 日志分析软件 网站实时监控 丹弗 河南服务器 最好的免费空间 免费mysql数据库 华为云服务登录 cloudlink yundun 域名与空间 独享主机 湖南idc 德隆中文网 谷歌台湾 lamp的音标 工信部icp备案查询 攻击服务器 hdchina 更多