Gandolfi et al., 2001 - Google Patents
Electromagnetic analysis: Concrete resultsGandolfi et al., 2001
View PDF- Document ID
- 206183976725068111
- Author
- Gandolfi K
- Mourtel C
- Olivier F
- Publication year
- Publication venue
- International workshop on cryptographic hardware and embedded systems
External Links
Snippet
Although the possibility of attacking smart-cards by analyzing their electromagnetic power radiation repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual cryptographic algorithms such as …
- 238000004458 analytical method 0 title description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gandolfi et al. | Electromagnetic analysis: Concrete results | |
Sayakkara et al. | A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics | |
Becker et al. | Stealthy dopant-level hardware trojans | |
Peeters et al. | Power and electromagnetic analysis: Improved model, consequences and comparisons | |
Bhasin et al. | Hardware Trojan horses in cryptographic IP cores | |
Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
EP1252561B1 (en) | Microprocessor resistant to power analysis | |
Joy Persial et al. | Side channel attack-survey | |
Sauvage et al. | Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module | |
Hutter et al. | RFID and its vulnerability to faults | |
Tiu | A new frequency-based side channel attack for embedded systems | |
Barenghi et al. | Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm aes implementation | |
Rohatgi | Electromagnetic attacks and countermeasures | |
Rae et al. | A taxonomy of attacks on secure devices | |
Hamdioui et al. | Hacking and protecting IC hardware | |
Lakshminarasimhan | Electromagnetic side-channel analysis for hardware and software watermarking | |
Kufel et al. | Sequence-aware watermark design for soft IP embedded processors | |
Leng | Smart card applications and security | |
De Mulder | Electromagnetic techniques and probes for side-channel analysis on cryptographic devices | |
Gao et al. | Eo-shield: A multi-function protection scheme against side channel and focused ion beam attacks | |
Matthews | Low cost attacks on smart cards: the electromagnetic sidechannel | |
Tehranipoor et al. | EM Side-Channel Attack on AES | |
US20170373837A1 (en) | Protection method and device against a side-channel analysis | |
Shao et al. | Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test | |
Hogenboom et al. | Principal component analysis and side-channel attacks-master thesis |