Loading…

Security evaluation of dual rail logic against DPA attacks

Based on a first order model of the switching current flowing in CMOS cell, an investigation of the robustness against DPA attacks of dual rail logic is carried out. The result of this investigation, performed on 130nm process, is the formal identification of the design range in which dual rail logi...

Full description

Saved in:
Bibliographic Details
Main Authors: Razafindraibe, A., Maurine, P., Robert, M., Renaudin, M.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 186
container_issue
container_start_page 181
container_title
container_volume
creator Razafindraibe, A.
Maurine, P.
Robert, M.
Renaudin, M.
description Based on a first order model of the switching current flowing in CMOS cell, an investigation of the robustness against DPA attacks of dual rail logic is carried out. The result of this investigation, performed on 130nm process, is the formal identification of the design range in which dual rail logic can be considered as robust
doi_str_mv 10.1109/VLSISOC.2006.313230
format conference_proceeding
fullrecord <record><control><sourceid>hal_CHZPO</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_lirmm_00109692v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4107626</ieee_id><sourcerecordid>oai_HAL_lirmm_00109692v1</sourcerecordid><originalsourceid>FETCH-LOGICAL-h1710-1c610f0e2c401f98c3adb9dee3d241ecbf04f50143a651637e168858a6e47c2e3</originalsourceid><addsrcrecordid>eNo90MFPwjAYBfAmaiIifwGX3s3w-9rStd4IipAswQT1unx0HVQ7ZrZBwn_vEozv8i6_vMNjbIwwQQT7-JltVpv1fCIA9ESiFBKu2J20gMYItOk1GwgpVGKUFLds1LZf0EdabTQM2NPGu2MTujP3J4pH6kJ94HXJiyNF3lCIPNa74DjtKBzajj-_zTh1Hbnv9p7dlBRbP_rrIftYvLzPl0m2fl3NZ1myxxQhQacRSvDCKcDSGiep2NrCe1kIhd5tS1DlFFBJ0lPUMvWojZka0l6lTng5ZA-X3T3F_KcJFTXnvKaQL2dZHkNTVTlA_4S24oS9Hl908N7_c4WQaqHlL4ngVbQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security evaluation of dual rail logic against DPA attacks</title><source>IEEE Xplore All Conference Series</source><creator>Razafindraibe, A. ; Maurine, P. ; Robert, M. ; Renaudin, M.</creator><creatorcontrib>Razafindraibe, A. ; Maurine, P. ; Robert, M. ; Renaudin, M.</creatorcontrib><description>Based on a first order model of the switching current flowing in CMOS cell, an investigation of the robustness against DPA attacks of dual rail logic is carried out. The result of this investigation, performed on 130nm process, is the formal identification of the design range in which dual rail logic can be considered as robust</description><identifier>ISSN: 2324-8432</identifier><identifier>ISBN: 3901882197</identifier><identifier>ISBN: 9783901882197</identifier><identifier>DOI: 10.1109/VLSISOC.2006.313230</identifier><language>eng</language><publisher>IEEE</publisher><subject>CMOS logic circuits ; Cryptography ; Encoding ; Energy consumption ; Engineering Sciences ; Logic design ; Micro and nanotechnologies ; Microelectronics ; Rails ; Robustness ; Security ; Semiconductor device modeling</subject><ispartof>2006 IFIP International Conference on Very Large Scale Integration, 2006, p.181-186</ispartof><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0002-9706-5710 ; 0000-0002-5075-2898</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4107626$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,309,310,780,784,789,790,885,2058,4050,4051,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4107626$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://hal-lirmm.ccsd.cnrs.fr/lirmm-00109692$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Razafindraibe, A.</creatorcontrib><creatorcontrib>Maurine, P.</creatorcontrib><creatorcontrib>Robert, M.</creatorcontrib><creatorcontrib>Renaudin, M.</creatorcontrib><title>Security evaluation of dual rail logic against DPA attacks</title><title>2006 IFIP International Conference on Very Large Scale Integration</title><addtitle>VLSISOC</addtitle><description>Based on a first order model of the switching current flowing in CMOS cell, an investigation of the robustness against DPA attacks of dual rail logic is carried out. The result of this investigation, performed on 130nm process, is the formal identification of the design range in which dual rail logic can be considered as robust</description><subject>CMOS logic circuits</subject><subject>Cryptography</subject><subject>Encoding</subject><subject>Energy consumption</subject><subject>Engineering Sciences</subject><subject>Logic design</subject><subject>Micro and nanotechnologies</subject><subject>Microelectronics</subject><subject>Rails</subject><subject>Robustness</subject><subject>Security</subject><subject>Semiconductor device modeling</subject><issn>2324-8432</issn><isbn>3901882197</isbn><isbn>9783901882197</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo90MFPwjAYBfAmaiIifwGX3s3w-9rStd4IipAswQT1unx0HVQ7ZrZBwn_vEozv8i6_vMNjbIwwQQT7-JltVpv1fCIA9ESiFBKu2J20gMYItOk1GwgpVGKUFLds1LZf0EdabTQM2NPGu2MTujP3J4pH6kJ94HXJiyNF3lCIPNa74DjtKBzajj-_zTh1Hbnv9p7dlBRbP_rrIftYvLzPl0m2fl3NZ1myxxQhQacRSvDCKcDSGiep2NrCe1kIhd5tS1DlFFBJ0lPUMvWojZka0l6lTng5ZA-X3T3F_KcJFTXnvKaQL2dZHkNTVTlA_4S24oS9Hl908N7_c4WQaqHlL4ngVbQ</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Razafindraibe, A.</creator><creator>Maurine, P.</creator><creator>Robert, M.</creator><creator>Renaudin, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0002-9706-5710</orcidid><orcidid>https://orcid.org/0000-0002-5075-2898</orcidid></search><sort><creationdate>200610</creationdate><title>Security evaluation of dual rail logic against DPA attacks</title><author>Razafindraibe, A. ; Maurine, P. ; Robert, M. ; Renaudin, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-h1710-1c610f0e2c401f98c3adb9dee3d241ecbf04f50143a651637e168858a6e47c2e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>CMOS logic circuits</topic><topic>Cryptography</topic><topic>Encoding</topic><topic>Energy consumption</topic><topic>Engineering Sciences</topic><topic>Logic design</topic><topic>Micro and nanotechnologies</topic><topic>Microelectronics</topic><topic>Rails</topic><topic>Robustness</topic><topic>Security</topic><topic>Semiconductor device modeling</topic><toplevel>online_resources</toplevel><creatorcontrib>Razafindraibe, A.</creatorcontrib><creatorcontrib>Maurine, P.</creatorcontrib><creatorcontrib>Robert, M.</creatorcontrib><creatorcontrib>Renaudin, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Razafindraibe, A.</au><au>Maurine, P.</au><au>Robert, M.</au><au>Renaudin, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security evaluation of dual rail logic against DPA attacks</atitle><btitle>2006 IFIP International Conference on Very Large Scale Integration</btitle><stitle>VLSISOC</stitle><date>2006-10</date><risdate>2006</risdate><spage>181</spage><epage>186</epage><pages>181-186</pages><issn>2324-8432</issn><isbn>3901882197</isbn><isbn>9783901882197</isbn><abstract>Based on a first order model of the switching current flowing in CMOS cell, an investigation of the robustness against DPA attacks of dual rail logic is carried out. The result of this investigation, performed on 130nm process, is the formal identification of the design range in which dual rail logic can be considered as robust</abstract><pub>IEEE</pub><doi>10.1109/VLSISOC.2006.313230</doi><tpages>6</tpages><orcidid>https://orcid.org/0000-0002-9706-5710</orcidid><orcidid>https://orcid.org/0000-0002-5075-2898</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2324-8432
ispartof 2006 IFIP International Conference on Very Large Scale Integration, 2006, p.181-186
issn 2324-8432
language eng
recordid cdi_hal_primary_oai_HAL_lirmm_00109692v1
source IEEE Xplore All Conference Series
subjects CMOS logic circuits
Cryptography
Encoding
Energy consumption
Engineering Sciences
Logic design
Micro and nanotechnologies
Microelectronics
Rails
Robustness
Security
Semiconductor device modeling
title Security evaluation of dual rail logic against DPA attacks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T14%3A03%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-hal_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20evaluation%20of%20dual%20rail%20logic%20against%20DPA%20attacks&rft.btitle=2006%20IFIP%20International%20Conference%20on%20Very%20Large%20Scale%20Integration&rft.au=Razafindraibe,%20A.&rft.date=2006-10&rft.spage=181&rft.epage=186&rft.pages=181-186&rft.issn=2324-8432&rft.isbn=3901882197&rft.isbn_list=9783901882197&rft_id=info:doi/10.1109/VLSISOC.2006.313230&rft_dat=%3Chal_CHZPO%3Eoai_HAL_lirmm_00109692v1%3C/hal_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-h1710-1c610f0e2c401f98c3adb9dee3d241ecbf04f50143a651637e168858a6e47c2e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4107626&rfr_iscdi=true