sensingnanosim剪卡
nanosim剪卡 时间:2021-01-17 阅读:(
)
F.
Bouesse,M.
Renaudin,G.
Sicard26av.
FélixViallet,38031GrenobleCedexfraidy.
bouesse@imag.
frAbstract.
ThepurposeofthispaperistoproposeadesigntechniqueforimprovingtheresistanceoftheQuasiDelayInsensitive(QDI)AsynchronouslogicagainstDifferentialPowerAnalysisAttacks.
ThiscountermeasureexploitsthepropertiesoftheQDIcircuitacknowledgementsignalstointroducetemporalvariationssoastorandomlydesynchronizethedataresistance,isformallypresentedandanalyzed.
ElectricalsimulationsperformedonaDEScrypto-processorconfirmtherelevancyoftheapproach,showingadrasticreductionoftheDPApeaks,thusincreasingthecomplexityofaDPAattackonQDIasynchronouscircuits.
1IntroductionandmotivationsNowadays,thepossibilitiesofferedbyallrecentpowerfulside-channelattackstoaccesstoconfidentialinformation,constrainsecuresystemsproviderstodevelopnewresistantsystemsagainsttheseattacks.
Amongthesenewhardwarecryptanalysisattacks,thereistheDifferentialPowerAnalysis(DPA)whichisoneofexistsacorrelationbetweendataprocessedbythedesignandtheobservablepowerItisinthiscontextthatthepropertiesofSelf-timedlogichavebeenexploitedinordertoproposeefficientcounter-measuresagainstDPAattacks[2][3].
Insensitiveasynchronouslogicdemonstratedthepotentialityofthistypeoflogictoincreasethechip'sresistance[4][5].
themostpowerfulandlowcostattack.
ThemainideabehindDPAisthatthereexploitedusingstatisticalmeanstoretracesecretkeyinformation.
AllresultsfromtheanalysisofSelf-timedlogicparticularlytheQuasiDelaySpringer),pp.
11–24.
ImprovingDPAResistanceofQuasiDelayprocessingtimes.
Theefficiencyofthecountermeasure,intermsofDPAshiftedAcknowledgmentSignalsTIMALaboratory,ConcurentIntegratedSystemsGroupBouesse,F.
,Renaudin,M.
,Sicard,G.
,2007,inIFIPInternationalFederationforInformationProcessing,Volume240,VLSI-SoC:FromSystemstoSilicon,eds.
Reis,R.
,Osseiran,A.
,Pfleiderer,H-J.
,(Boston:consumption.
In1998PaulKocher[1]demonstratedhowthiscorrelationcanbeInsensitiveCircuitsUsingRandomlyTime-However,paper[6]reportedthat,eveniftheQDIasynchronouslogicincreasestheresistanceofthechip,therestillexistssomeresidualsourcesofleakagethatcanbeusedtosucceedtheattack.
TheobjectiveofthispaperistomakeaDPAattackimpossibleorimpracticablewithstandardequipmentbyincreasingthecomplexityoftheattack.
Fordoingso,weintroducerandomlytimeshifted(RTS)acknowledgmentsignalsintheQDIasynchronouslogicinordertoaddnoiseinchip'spowerconsumption.
Indeed,theuseofaRTSacknowledgementsignalinanasynchronousQuasiDelayInsensitiveblockenablesustodesynchronizethedataprocessingtime,soastocomputetheblocks'outputchannelsatrandomtimes.
AstheDPAattackrequiresthesignalstobesynchronizedwithrespecttoafixedtimeinstantfordataanalysis[1][7],thisdesynchronizationmakestheDPAattackmoredifficultasitisprovedinthispaper.
Wepresentinthefirstpartofthepaper(section2),thepropertiesofQuasiDelayInsensitiveasynchronouslogic,especiallythepropertiesoftheacknowledgmentsignal.
Section3firstintroducestheformalanalysisoftheDPAattack.
ItthenpresentsthedesynchronizationtechniquebasedonRTSacknowledgementsignalsandformalizesitsefficiencyintermsofDPAresistance.
Finally,sections4and5illustratethetechniqueusingelectricalsimulationsperformedonthewellknownDataEncryptionStandard(DES)architecture.
Section6concludesthepaperandgivessomeprospects.
2QuasiDelayInsensitiveAsynchronouslogic:theacknowledgmentsignalThissectionrecallsthebasiccharacteristicsofanasynchronouscircuit,particularlytheruleoftheacknowledgementsignalintheQDIasynchronouslogic.
Becausethistypeofcircuitdoesnothaveaglobalsignalwhichsamplesthedataatthesametime,asynchronouscircuitsrequireaspecialprotocoltoperformacommunicationbetweenitsmodules.
Thebehaviorofanasynchronouscircuitissimilartoadata-flowmodel.
Theasynchronousmodule,asdescribedinfigure1andwhichcanactuallybeofanycomplexity,receivesdatafromitsinputchannels(requestsignal),processesthem,andthensendstheresultsthroughitsoutputchannels.
Therefore,amoduleisactivatedwhenitsensesthepresenceofincomingdata.
Thispoint-to-pointcommunicationisrealizedwithaprotocolimplementedinthemoduleitself.
Suchprotocolsnecessitateabi-directionalsignalingbetweenbothmodules(requestandacknowledgement):itiscalledhandshakingprotocols.
12F.
Bouesse,M.
Renaudin,G.
SicardFig.
1.
Handshakebasedcommunicationbetweenmodules.
Thebasisofthesequencingrulesofasynchronouscircuitsliesinthehandshakingprotocols.
Amongthetwomainsclassesofprotocols,onlythefour-phaseprotocolisconsideredanddescribedinthiswork.
ItisthemostwidelyusedandefficientlyimplementedinCMOS[8].
Fig.
2.
Four-phasehandshakingprotocol.
Inthefirstphase(Phase1)dataaredetectedbythereceiverwhentheirvalueschangefrominvalidtovalidstates.
Thenfollowsthesecondphasewherethereceiversetstoonetheacknowledgementsignal.
Thesenderinvalidatesalldatainthethirdphase.
Finallythereceiverresetstheacknowledgmentsignalwhichcompletesthereturntozerophase.
Dedicatedlogicandspecialencodingarenecessaryforsensingdatavalidity/invalidityandforgeneratingtheacknowledgementsignal.
Requestforcomputationcorrespondstodatadetectionandtheresetoftheacknowledgmentsignalmeansthatthecomputationiscompletedandthecommunicationisfinished.
InQDIasynchronouslogic,ifonebithastobetransferredthroughachannelwithafour-phaseprotocol,twowiresareneededtoencodeitsdifferentvalues.
Thisiscalleddual-railencoding(table1).
13ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsTable1.
Dualrailencodingofthethreestatesrequiredtocommunicate1bit.
ChanneldataA0A1010101Invalid00Unused11ThisencodingcanbeextendedtoN-rail(1-to-N).
Theacknowledgementsignalisgeneratedusingthedata-encoding.
Thedual-railencodedoutputsaresensedwithNorgatesforgeneratingtheacknowledgmentsignal,asillustratedinfigure3.
Fig.
3.
1-bitHalf-bufferimplementingafour-phaseprotocol(CrisaMullergatewitharesetsignal)TheMullerC-element'struthtableandsymbolaregiveninFigure4.
Fig.
4.
TruthtableandsymboloftheC-element.
Figure3illustratestheimplementationoftwoasynchronousmodules(AandB)withtheirmemoryelementscalledhalf-buffer.
Thehalf-bufferimplementsafour-phaseprotocol.
WhentheacknowledgementsignalofmoduleB(B_ack)isset,itmeansthatthemoduleisreadytoreceivedata.
IfadataistransferredfrommoduleAtomoduleB,moduleBcomputesitsoutputsandresetsitsacknowledgementsignal(B_ack).
ModuleBisthenreadytoreceiveinvaliddatafrommoduleA.
14F.
Bouesse,M.
Renaudin,G.
SicardInthisoperatingmode,theacknowledgmentsignalcanbeconsideredasalocalenablesignalwhichcontrolsdatastoragelocally.
Notethatthismechanismdoesnotneedanytimingassumptiontoensurefunctionalcorrectness;itissimplysensitivetoevents.
Hence,theacknowledgmentsignalenablestocontroltheactivationofthecomputationinagivenmodule,aswellasitstimeinstant.
Thetechniqueproposedinthispaper,exploitsthispropertybyinsertingrandomdelaysintheacknowledgementsignals.
ItiscalledRandomlyTime-Shiftedacknowledgmentsignals.
Itbasicallydesynchronizesthepowerconsumptioncurvesmakingthedifferentialpoweranalysismoredifficultasprovedinthenextsection.
3DPAandRTSacknowledgmentsignalonQDIasynchronouscircuits:FormalApproachInthissection,weformallyintroducethebasisoftheDPAattack[7]andformallyanalysetheeffectsoftheRTSacknowledgementsignalonQDIasynchronouscircuitsintermsofDPAresistance.
3.
1DifferentialPowerAnalysisAttackThefunctionalhypothesisofDPAattackistheexistingcorrelationbetweenthedataprocessedbythecircuitryanditspowerconsumption.
TherearethreemainphasesforprocessingtheDPAattack:thechoiceoftheselectionfunctionD,thedatacollectionphaseandthedataanalysisphase.
Phase1:Inthefirststep,theselectionfunctionisdefinedbyfindingblocksinthearchitecturewhichdependonsomepartsofthekey.
SuchafunctionintheDESalgorithmforexamplecanbedefinedasfollows:D(C1,P6,K0)=SBOX1(P6K0)C1=firstbitofSBOX1function.
P6=6-bitplain-text-inputoftheSBOX1function.
K0=6-bitofthefirstround'ssubkey:keytoguess.
SBOX1=asubstitutionfunctionofDESwitha4-bitoutput.
Phase2:ThesecondstepconsistsincollectingthediscretetimepowersignalSi(tj)andthecorrespondingciphertextoutputs(CTOi)foreachoftheNplaintextinputs(PTIi).
ThepowersignalSi(tj)representsthepowerconsumptionoftheselectionfunction:indexicorrespondstothePTIiplaintextstimulusandtimetjcorrespondstothetimewheretheanalysistakesplace.
Phase3:Therightkeyisguessedinthethirdphase.
AllcurrentsignalsSi(tj)aresplitintotwosetsaccordingtoaselectionfunctionD.
15ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsTheaveragepowersignalofeachsetisgivenby:Where|no|and|n1|representthenumberofpowersignalsSi(tj)respectivelyinsetS0andS1.
TheDPAbiassignalisobtainedby:IftheDPAbiassignalshowsimportantpeaks,itmeansthatthereisastrongcorrelationbetweentheDfunctionandthepowersignal,andsotheguessedkeyiscorrect.
Ifnot,theguessedkeyisincorrect.
SelectinganappropriateDfunctionisthenessentialinordertoguessagoodsecretkey.
Asillustratedabove,theselectionfunctionDcomputesattimetjduringtheciphering(ordeciphering)process,thevalueoftheattackedbit.
Whenthisvalueismanipulatedattimetj,therewillbeatthistime,adifferenceontheamountofdissipatedpoweraccordingtothebit'svalue(eitheroneorzero).
Let'sdefined0i(tj)theamountofdissipatedpowerwhentheattackedbitswitchesto0attimetjbyprocessingtheplaintextinputianddefined1i(tj)theamountofdissipatedpowerwhenthisbitswitchesto1.
Inreality,thevaluesofd0i(tj)andd1i(tj)correspondtothedissipatedpowerofalldata-pathswhichcontributetotheswitchingactivityoftheattackedbit.
EachoneofthesevalueshasitsweightineachaveragepowersignalA0(tj)andA1(tj).
AsthegoaloftheDPAattackistocomputethedifferencebetweenthesetwovalues,wecanexpresstheaveragepowersignalofthesebothsetsA0(tj)andA1(tj)by:(1)(3)(4)(2)(4)16F.
Bouesse,M.
Renaudin,G.
SicardInordertomakeanefficientanalysis,theamplitudeoftheDPAsignatureε(tj)mustbeashighaspossible.
Asimplewaytoguaranteethisistouseasignificantnumberofplaintextinputs(N).
Indeed,thenumberofPTIi(thenumberofpowersignalSi(tj))usedtoimplementtheattackenablestoreducetheeffectsofthenoisysignalsandtoincreasetheprobabilityofexcitingalldata-paths.
Itiswellknownthatthesignal-to-noiseratiofortheaveragedsignalincreasesasthesquarerootofthenumberofcurves.
σnoiseisthestandarddeviationofthenoiseIncreasingthenumberofplaintextinputs(PTIi)allowsustoensurethatalldata-pathswhichmakeswitchingto0orto1theattackedbitareexcited.
Thedealhere,istotakeintoconsiderationallpossiblequantitiesdxi(tj)whichrepresenttheswitchingcurrentoftheattackedbit.
Astheprobabilityofexcitingalldata-pathsisproportionaltoN,biggerthevalueofN,bettertheprobabilitytoexcitealldata-pathsoftheattackedbitis:misgenerallyunknownbythehackerandrepresentsthenumberofdata-paths.
Therefore,theknowledgeoftheimplementationwhichenablestochoosetheplaintextinputsandtheuseofhighqualityinstrumentationareassetsthatimprovetheDPAattack.
Infact,theyconsiderablyreducethenumberofdata(N)requiredforsucceedingtheattack.
3.
2TheRTSacknowledgementsignalThemethodweproposeinthispaperenablesthedesignertointroduceatemporalnoiseinthedesigninordertodesynchronizethetimerequiredforprocessingtheattackedbit.
Theideaoftheapproachistorandomlyshiftintimethecurrentprofileofthedesign.
Toachievethisgoal,werandomizetheacknowledgmentsignallatencyoftheblocksofthearchitecture.
Asillustratedinfigure5,weuseadelayelementcontrolledbyarandomnumbergenerator.
Thedesignoftherandomnumbergeneratorisoutofthescopeofthispaper.
True(5)17ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsTherefore,theDPAsignatureisexpressedby:randomnumbergenerator(TRNG)designisanimportanttopicandmanydifferenttypesofTRNGimplementationexist[9][10].
Fig.
5.
ImplementationofarandomacknowledgmentsignalLet'sdenotenthenumberofpossiblerandomdelaysimplementedinagivenarchitecture.
ndependsonthenumberofavailableacknowledgmentsignals(m)inthearchitectureandonthenumberofdelays(ki)implementedperacknowledgmentsignal.
The"n"valueiscomputedbythefollowingexpression:assumingcascadedmodules.
Iftheacknowledgmentsignalisrandomizedntimes,itmeansthatthevalueoftheattackedbitiscomputedatndifferenttimes(tj).
N/nrepresentsthenumberoftimestheattackedbitisprocessedatagiventimetjandN/2nrepresentsthenumberoftimesthequantitiesd0i(tj)andd1i(tj)ofthisbitcontributetosetS0andS1respectively.
IfweconsiderthattheNcurvesareequallysplitinbothsets(n0=n1=N/2),theaveragepowersignalofeachsetisnowexpressedby:TheDPAbiassignalisthengivenbythefollowingexpression:with;6)(6)18F.
Bouesse,M.
Renaudin,G.
SicardTheseexpressionsshowthat,insteadofhavingasinglequantityεx(tj),wehavendifferentsignificantquantitiesεx(tn)whichcorrespondtontimeswheretheattackedbitisprocessed.
Moreover,italsodemonstratesthateachquantityεx(tj)isdividedbyafactornasillustratedbythefollowingsimplification:withItmeansthat,althoughthenumberofsignificantpointsisincreasedbyn,thisapproachdividesbyntheaveragecurrentpeaksvariations.
ItoffersthepossibilitytobringdownthelevelofDPAbiassignalclosertocircuitry'snoise.
3.
2DiscussionLet'sforexampleimplementtheDPAattackusing1000plaintextinputs(N=1000).
Inthestandardapproachwheretheattackedbitisprocessedatauniquegiventime,weobtainanaverageof500currentcurvesforeachofthesetsS0andS1.
UsingourapproachwithRTSacknowledgmentsignalsandassumingn=16(forexample),weobtain16differentpoints(intermsoftime)wheretheattackedbitisprocessed.
Thereare62valuesdxi(tj)(N/ncurves)wherethisbitisprocessedattime(tj).
Eachsetthencontains31curves.
Whentheaveragepowersignalofeachsetiscalculated,valuesdxi(tj)are16timeslowerthanwithoutRTSacknowledgmentsignals.
Hence,thecontributionofdxi(tj)incurrentpeaksvariationsarereducedbyafactor16.
Therefore,tosucceedtheattackthehackerisobligedtosignificantlyincreasethenumberofacquisitions(N)ortoapplyacross-correlationfunctionwhichisexactlythegoaltoachieveintermsofattack'scomplexity.
Infact,cross-correlationremainsausefulmethodforsynchronizingdata.
Buttobefunctional,thehackermustidentifytheamountofcurrentprofileoftheattackedbit(dxi(tj))tobeusedasareference,andthencomputecross-correlationsinordertosynchronizeeachoftheNcurveswiththereference.
Knowingthat,thecross-correlationisappliedoninstantaneouscurrentcurveswhichcontainsignificantquantityofnoise.
Toincreasethedifficultyofthisanalysis,thevalueofncanbesignificantlyincreasedbydealingwiththevaluesofmandk.
Thevalueofmdependsonthearchitecture.
Itsvaluecanbeincreasedbyexpandingtheacknowledgmentsignalsofthearchitecture.
Eachbitorintermediatevalueofthedesigncanbeseparatelyacknowledged.
Thistechniqueenablesalsotoreducethedata-pathlatency.
(7)(8)19ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsThevaluesofthedelaydependonthetimespecificationtocipher/decipherdata.
Theyareboundedbythemaximumciphering/decipheringtime.
Consequently,theacknowledgementsignalsofanyasynchronousquasidelayinsensitivecircuitcanbeexploitedtointroducerandomdelaysandthereforeincreasetheDPAresistanceofthechips.
4CaseStudy:DESCrypto-processorThissectiondealswiththedifferentpossibilitiesofimplementingRTSacknowledgmentsignalsonQDIasynchronouscircuits.
TheDESwaschosenasanevaluationvectorbecausetheattackonthisalgorithmiswellknown.
Figure6representstheDEScorearchitecture,implementingafour-phasehandshakeprotocol,using1-to-Nencodeddataandbalanceddata-paths[2].
Thearchitectureiscomposedofthreeiterativeasynchronousloopssynchronizedthroughcommunicatingchannels.
Oneloopforthecipheringdata-path,thesecondforthekeydata-pathandthelastoneforthecontroldata-pathwhichenablesthecontrolofthesixteeniterationsofthealgorithm.
Forexamplelet'sapplythetechniquetothefivegreyblocksoffigure6.
Eachblockhasitsownacknowledgementsignalandthedelayinsertedineachacknowledgmentsignalcantakefourvalues.
Therefore,thereare1024possibledelayvalues(n=1024).
Itmeansthat(intermsofDPAresistance)thecurrentpeakvariationscorrespondingtodxi(tj)willbedividedby1024.
Fig.
6.
AsynchronousDEScorearchitecture20F.
Bouesse,M.
Renaudin,G.
Sicard5ResultsandAnalysis:ElectricalsimulationsElectricalsimulationsenableustoanalyzetheelectricalbehaviourofthedesignwithhighaccuracy,i.
e.
withoutdisturbingsignal(noise).
AllelectricalsimulationsareperformedwithNanosimusingtheHCMOS9designkit(0.
13!
m)fromSTMicroelectronics.
Thearchitectureusedfortheseelectricalanalysisimplementsoneacknowledgementsignalperblock.
However,fortheneedsofillustrationonlytheacknowledgmentsignaloftheinputsoftheSBOX1israndomlydelayedwith8differentdelays.
Thedefinedselectionfunction,usedtoimplementtheattack,isasfollows:D(Cn,P6,K0)=SBOX1(P6K0)withn∈{1,2,3,4}TheDPAattackhasbeenimplementedonthefouroutputbitsoftheSBOX1andonthefirstiterationoftheDESalgorithmusing64plaintextinputs(N=64).
Figure7showsthecurrentprofileofthefirstiterationwhentheRTSacknowledgmentsignalisactivatedanddeactivated.
Whenthedelayof13nsisused,thetimerequiredforprocessinganiteration(figure7-b)correspondstothetimerequiredtoprocess3iterationswithoutdelays(figure7-a).
Hencethecipheringtimeismultipliedbyafactor3.
Thisdelayischosenforthesakeofillustrationonly.
GivenalevelofDPAresistance,thedelaycanbestronglydecreasedinpractice(downtoafewnanosecondswiththistechnology)toreduceasmuchaspossiblethetimingoverheadaswellasthehardwareoverheadcausedbytheapplicationofthetechniqueFig.
7.
CurrentprofileoftheDESQDIasynchronousarchitecture.
21ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsOnlythefirstiterationsareconsideredb-withacorrectguessedkeyFig.
8.
ElectricalsignatureswhenperformedDPAattackonbit4oftheSBOX1.
Onlythefirstroundisconsideredandcomputedusingmorethan2.
100.
000point.
AstheSBOX1hasfouroutputbitsencodedindual-rail,wehave8data-paths(fromoutputstoinputs)whichenabletocompute8valuesofdxi(tj).
Let'srecallthat,dxi(tj)(d0i(tj);d1i(tj))correspondstotheamountofdissipatedpowerwhentheattackedbitisprocessedattimetj.
Forexample,let'sconsidertheoutputbit4oftheSBOX1.
Contrarytoastandardapproachandduetothe8delayshifts,thevaluesd04(tj)andd14(tj)areprocessed4timesinsteadofbeingprocessed32times,sothattheirweightsarereducedbyafactor8intosetsS1andS0.
EachofthissetenablesustocalculatetheaveragecurrentsΑ0(tj)andΑ1(tj).
22F.
Bouesse,M.
Renaudin,G.
SicardFigure8showstheseaveragecurrentprofiles(A0(tj)andA1(tj))whichareusedtocomputetheDPAbiassignal(S(tj)),alsoshowninfigure8.
PartIofthesecurvesrepresentthefirstencryptionoperationsinthefirstiteration(seefigure8).
ThispartisnotaffectedbytheRTSacknowledgmentsignalwhichisonlyappliedonSBOX1.
Infact,beforecomputingtheSBOXfunction,thechipfirstcomputesIP,ExpansionandXor48functions(figure6),sothat,inthefirstiteration,thesefunctions,arenotaffectedbytheRTSacknowledgementsignalofSBOX1.
ThisexplainswhytheamplitudeoftheaveragepowercurvestartsdecreasingafterpartIanditclearlyillustratestheeffectoftheRTSsignalonthepowercurves.
ThiscanofcoursebechangedbyactivatingtheRTSacknowledgementsignalsofblocksIP,Expansionand/orXor48.
Intheconsideredexample,64PTIicurvesareusedtoimplementtheattack.
Inthiscase,obtainingthekeybitfromtheDPAbiassignalisimpossibleasshowninfigure8.
Indeed,thereisnorelevantpeakintheDPAcurrentcurves(figure8-aand8-b).
6ConclusionThispaperpresentedacountermeasureagainstDPAbasedonrandomlytime-shiftedacknowledgmentsignalsofasynchronousQDIcircuits.
Theefficiencyofthecountermeasurewasfirsttheoreticallyformalizedandthendemonstratedusingelectricalsimulations.
ThetechniqueprinciplewasillustratedonaDESarchitecture.
generator.
7ReferencesM.
Wienered.
,Springer-Verlag,1999.
23ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsCryptology-Crypto99Proceedings,LectureNotesInComputerScienceVol.
1666,FutureworkswillbefocusedonthedesignandfabricationofaDESprototypeApril2002.
Manchester,U.
K.
implementingtheRTSacknowledgementsignalstogetherwitharandomnumberTemple,"SPA-ASynthesisableAmuletCoreforSmartcardApplications",ProceedingsoftheEighthInternationalSymposiumonAsynchronousCircuitsandbytheIEEEComputerSociety.
Systems(ASYNC2002).
Pages201-210.
Manchester,8-11/04/2002.
Published"ImprovingSmartCardSecurityusingSelf-timedCircuits",EighthInter-pp137-151,2003.
nationalSymposiumonAsynchronousCircuitsandsystems(ASYNC2002).
8-112.
SimonMoore,RossAnderson,PaulCunningham,RobertMullins,GeorgeTaylor,3.
L.
A.
Plana,P.
A.
Riocreux,W.
J.
Bainbridge,A.
Bardsley,J.
D.
GarsideandS.
4.
JacquesJ.
AFournier,SimonMoore,HuiyunLi,RobertMullins,andGerorge1.
P.
Kocher,J.
Jaffe,B.
Jun,"DifferentialPowerAnalysis,"AdvancesinTaylor,"SecurityEvalutionofAsunchronousCircuits",CHES2003,LNCS2779,5.
F.
Bouesse,M.
Renaudin,B.
Robisson,EBeigne,P.
Y.
Liardet,S.
Prevosto,J.
SystemsBordeaux,France,November24-26,2004.
2523,Springer,Berlin,Germany,ISBN3-540-00409-2,pp.
415-430.
3203,Springer,Berlin,Germany,pp.
555-564.
24Sonzogni,"DPAonQuasiDelayInsensitiveAsynchronouscircuits:ConcreteF.
Bouesse,M.
Renaudin,G.
SicardChicago,Illinois,USE,May10-11,1999.
AnalysisAttacksonSmartcards",USENIXWorkshoponSmartcardTechnology,8.
MarcRenaudin,"Asynchronouscircuitsandsystems:apromisingdesignResults",TobepublishedinXIXConferenceonDesignofCircuitsandIntegratedandmobility"(MIGAS2000),specialissueoftheMicroelectronics-EngineeringJournal,ElsevierScience,GUESTEditors:P;Senn,M.
Renaudin,J,Boussey,Vol.
6.
G.
F.
Bouesse,M.
Renaudin,S.
Dumont,F.
Germain,DPAonQuasiDelayHardwareandEmbeddedSystems(CHES2002),RedwoodShore,USA,LNCSNo.
RandomNumberGeneratorinAlteraStratixFPLDs,inJ.
Becker,M.
Platzner,S.
InsensitiveAsynchronousCircuits:FormalizationandImprovement,DATE2005.
Vernalde(Eds.
):"Field-ProgrammableLogicandApplications,"14thInternational54,N°1-2,December2000,pp.
133-149.
Conference,FPL2004,Antwerp,Belgium,August30-September1,2004,LNCSReconfigurableHardware,InC.
K.
Ko,andC.
Paar,(Eds.
):Cryptographicp.
4247.
T.
S.
MessergesandE.
A.
Dabbish,R.
H.
Sloan,"InvestigationsofPower9.
ViktorFischer,M.
Drutarovsk,TrueRandomNumberGeneratorEmbeddedinalternative",MicroelectronicforTelecommunications:managinghighcomplexity10.
V.
Fischer,M.
Drutarovsk,M.
imka,N.
Bochard,HighPerformanceTrue
热网互联怎么样?热网互联(hotiis)是随客云计算(Suike.Cloud)成立于2009年,增值电信业务经营许可证:B1-20203716)旗下平台。热网互联云主机是CN2高速回国线路,香港/日本/洛杉矶/韩国CN2高速线路云主机,最低33元/月;热网互联国内BGP高防服务器,香港服务器,日本服务器全线活动中,大量七五折来袭!点击进入:热网互联官方网站地址热网互联香港/日本/洛杉矶/韩国cn2...
Sharktech荷兰10G带宽的独立服务器月付319美元起,10Gbps共享带宽,不限制流量,自带5个IPv4,免费60Gbps的 DDoS防御,可加到100G防御。CPU内存HDD价格购买地址E3-1270v216G2T$319/月链接E3-1270v516G2T$329/月链接2*E5-2670v232G2T$389/月链接2*E5-2678v364G2T$409/月链接这里我们需要注意,默...
爱用云互联怎么样?爱用云是一家成立于2018年的老牌商家旗下的服务器销售品牌,是正规持证IDC/ISP/IRCS商家,主要销售国内、中国香港、国外服务器产品,线路有腾讯云国外线路、自营香港CN2线路等,都是中国大陆直连线路,非常适合免备案建站业务需求和各种负载较高的项目,同时国内服务器也有多个BGP以及高防节点。专注为个人开发者用户,中小型,大型企业用户提供一站式核心网络云端服务部署,促使用户云端...
nanosim剪卡为你推荐
国外域名注册如何注册国外域名?asp主机空间有ASP虚拟主机空间,还需要另外买Access数据库么?虚拟空间免费试用哪有免费试用的虚拟主机?免费网站空间哪里有永久免费的网站空间?100m网站空间做网站100M的空间够用吗?虚拟主机管理系统推荐几个适合windows的免费虚拟主机管理系统论坛虚拟主机我想买个论坛虚拟主机,但是去了好多网站都不怎么样?域名停靠“域名停靠”怎么挣钱啊?动态域名解析怎么做动态域名解析啊,希望高手指点根域名服务器根域名解析服务器全世界有多少台?听说是13台,,是吗?为什么只有13台?
免费国际域名 租服务器价格 快速域名备案 新网域名管理 淘宝抢红包攻略 256m内存 香港托管 免费ftp空间 permitrootlogin 青果网 三拼域名 蜗牛魔方 hostker 工作站服务器 asp免费空间申请 服务器合租 四核服务器 便宜空间 godaddy空间 电信主机托管 更多