Design Trade-Offs In Threshold Implementations

2019 26TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS)(2019)

引用 1|浏览40
暂无评分
摘要
With the expansion of the IoT and the emergence of vast amounts of remote hardware devices side-channel attacks pose a serious threat, requiring adequate protection. Among the hardware countermeasures, Threshold Implementations (TI) is one of the most used ones. It is designed to avoid the leakage of sensitive data from hardware designs. In this work, we examine the cost of applying TI to the block cipher PRINCE with respect to the latency, power/energy consumption, occupied area. We explore different versions of TI with respect to the security order and TI variations, and compare the strengths and weaknesses of each approach.
更多
查看译文
关键词
block cipher PRINCE,threshold implementations,IoT,remote hardware devices side-channel attacks,hardware countermeasures,hardware designs
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要