sensingnanosim剪卡
nanosim剪卡 时间:2021-01-17 阅读:(
)
F.
Bouesse,M.
Renaudin,G.
Sicard26av.
FélixViallet,38031GrenobleCedexfraidy.
bouesse@imag.
frAbstract.
ThepurposeofthispaperistoproposeadesigntechniqueforimprovingtheresistanceoftheQuasiDelayInsensitive(QDI)AsynchronouslogicagainstDifferentialPowerAnalysisAttacks.
ThiscountermeasureexploitsthepropertiesoftheQDIcircuitacknowledgementsignalstointroducetemporalvariationssoastorandomlydesynchronizethedataresistance,isformallypresentedandanalyzed.
ElectricalsimulationsperformedonaDEScrypto-processorconfirmtherelevancyoftheapproach,showingadrasticreductionoftheDPApeaks,thusincreasingthecomplexityofaDPAattackonQDIasynchronouscircuits.
1IntroductionandmotivationsNowadays,thepossibilitiesofferedbyallrecentpowerfulside-channelattackstoaccesstoconfidentialinformation,constrainsecuresystemsproviderstodevelopnewresistantsystemsagainsttheseattacks.
Amongthesenewhardwarecryptanalysisattacks,thereistheDifferentialPowerAnalysis(DPA)whichisoneofexistsacorrelationbetweendataprocessedbythedesignandtheobservablepowerItisinthiscontextthatthepropertiesofSelf-timedlogichavebeenexploitedinordertoproposeefficientcounter-measuresagainstDPAattacks[2][3].
Insensitiveasynchronouslogicdemonstratedthepotentialityofthistypeoflogictoincreasethechip'sresistance[4][5].
themostpowerfulandlowcostattack.
ThemainideabehindDPAisthatthereexploitedusingstatisticalmeanstoretracesecretkeyinformation.
AllresultsfromtheanalysisofSelf-timedlogicparticularlytheQuasiDelaySpringer),pp.
11–24.
ImprovingDPAResistanceofQuasiDelayprocessingtimes.
Theefficiencyofthecountermeasure,intermsofDPAshiftedAcknowledgmentSignalsTIMALaboratory,ConcurentIntegratedSystemsGroupBouesse,F.
,Renaudin,M.
,Sicard,G.
,2007,inIFIPInternationalFederationforInformationProcessing,Volume240,VLSI-SoC:FromSystemstoSilicon,eds.
Reis,R.
,Osseiran,A.
,Pfleiderer,H-J.
,(Boston:consumption.
In1998PaulKocher[1]demonstratedhowthiscorrelationcanbeInsensitiveCircuitsUsingRandomlyTime-However,paper[6]reportedthat,eveniftheQDIasynchronouslogicincreasestheresistanceofthechip,therestillexistssomeresidualsourcesofleakagethatcanbeusedtosucceedtheattack.
TheobjectiveofthispaperistomakeaDPAattackimpossibleorimpracticablewithstandardequipmentbyincreasingthecomplexityoftheattack.
Fordoingso,weintroducerandomlytimeshifted(RTS)acknowledgmentsignalsintheQDIasynchronouslogicinordertoaddnoiseinchip'spowerconsumption.
Indeed,theuseofaRTSacknowledgementsignalinanasynchronousQuasiDelayInsensitiveblockenablesustodesynchronizethedataprocessingtime,soastocomputetheblocks'outputchannelsatrandomtimes.
AstheDPAattackrequiresthesignalstobesynchronizedwithrespecttoafixedtimeinstantfordataanalysis[1][7],thisdesynchronizationmakestheDPAattackmoredifficultasitisprovedinthispaper.
Wepresentinthefirstpartofthepaper(section2),thepropertiesofQuasiDelayInsensitiveasynchronouslogic,especiallythepropertiesoftheacknowledgmentsignal.
Section3firstintroducestheformalanalysisoftheDPAattack.
ItthenpresentsthedesynchronizationtechniquebasedonRTSacknowledgementsignalsandformalizesitsefficiencyintermsofDPAresistance.
Finally,sections4and5illustratethetechniqueusingelectricalsimulationsperformedonthewellknownDataEncryptionStandard(DES)architecture.
Section6concludesthepaperandgivessomeprospects.
2QuasiDelayInsensitiveAsynchronouslogic:theacknowledgmentsignalThissectionrecallsthebasiccharacteristicsofanasynchronouscircuit,particularlytheruleoftheacknowledgementsignalintheQDIasynchronouslogic.
Becausethistypeofcircuitdoesnothaveaglobalsignalwhichsamplesthedataatthesametime,asynchronouscircuitsrequireaspecialprotocoltoperformacommunicationbetweenitsmodules.
Thebehaviorofanasynchronouscircuitissimilartoadata-flowmodel.
Theasynchronousmodule,asdescribedinfigure1andwhichcanactuallybeofanycomplexity,receivesdatafromitsinputchannels(requestsignal),processesthem,andthensendstheresultsthroughitsoutputchannels.
Therefore,amoduleisactivatedwhenitsensesthepresenceofincomingdata.
Thispoint-to-pointcommunicationisrealizedwithaprotocolimplementedinthemoduleitself.
Suchprotocolsnecessitateabi-directionalsignalingbetweenbothmodules(requestandacknowledgement):itiscalledhandshakingprotocols.
12F.
Bouesse,M.
Renaudin,G.
SicardFig.
1.
Handshakebasedcommunicationbetweenmodules.
Thebasisofthesequencingrulesofasynchronouscircuitsliesinthehandshakingprotocols.
Amongthetwomainsclassesofprotocols,onlythefour-phaseprotocolisconsideredanddescribedinthiswork.
ItisthemostwidelyusedandefficientlyimplementedinCMOS[8].
Fig.
2.
Four-phasehandshakingprotocol.
Inthefirstphase(Phase1)dataaredetectedbythereceiverwhentheirvalueschangefrominvalidtovalidstates.
Thenfollowsthesecondphasewherethereceiversetstoonetheacknowledgementsignal.
Thesenderinvalidatesalldatainthethirdphase.
Finallythereceiverresetstheacknowledgmentsignalwhichcompletesthereturntozerophase.
Dedicatedlogicandspecialencodingarenecessaryforsensingdatavalidity/invalidityandforgeneratingtheacknowledgementsignal.
Requestforcomputationcorrespondstodatadetectionandtheresetoftheacknowledgmentsignalmeansthatthecomputationiscompletedandthecommunicationisfinished.
InQDIasynchronouslogic,ifonebithastobetransferredthroughachannelwithafour-phaseprotocol,twowiresareneededtoencodeitsdifferentvalues.
Thisiscalleddual-railencoding(table1).
13ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsTable1.
Dualrailencodingofthethreestatesrequiredtocommunicate1bit.
ChanneldataA0A1010101Invalid00Unused11ThisencodingcanbeextendedtoN-rail(1-to-N).
Theacknowledgementsignalisgeneratedusingthedata-encoding.
Thedual-railencodedoutputsaresensedwithNorgatesforgeneratingtheacknowledgmentsignal,asillustratedinfigure3.
Fig.
3.
1-bitHalf-bufferimplementingafour-phaseprotocol(CrisaMullergatewitharesetsignal)TheMullerC-element'struthtableandsymbolaregiveninFigure4.
Fig.
4.
TruthtableandsymboloftheC-element.
Figure3illustratestheimplementationoftwoasynchronousmodules(AandB)withtheirmemoryelementscalledhalf-buffer.
Thehalf-bufferimplementsafour-phaseprotocol.
WhentheacknowledgementsignalofmoduleB(B_ack)isset,itmeansthatthemoduleisreadytoreceivedata.
IfadataistransferredfrommoduleAtomoduleB,moduleBcomputesitsoutputsandresetsitsacknowledgementsignal(B_ack).
ModuleBisthenreadytoreceiveinvaliddatafrommoduleA.
14F.
Bouesse,M.
Renaudin,G.
SicardInthisoperatingmode,theacknowledgmentsignalcanbeconsideredasalocalenablesignalwhichcontrolsdatastoragelocally.
Notethatthismechanismdoesnotneedanytimingassumptiontoensurefunctionalcorrectness;itissimplysensitivetoevents.
Hence,theacknowledgmentsignalenablestocontroltheactivationofthecomputationinagivenmodule,aswellasitstimeinstant.
Thetechniqueproposedinthispaper,exploitsthispropertybyinsertingrandomdelaysintheacknowledgementsignals.
ItiscalledRandomlyTime-Shiftedacknowledgmentsignals.
Itbasicallydesynchronizesthepowerconsumptioncurvesmakingthedifferentialpoweranalysismoredifficultasprovedinthenextsection.
3DPAandRTSacknowledgmentsignalonQDIasynchronouscircuits:FormalApproachInthissection,weformallyintroducethebasisoftheDPAattack[7]andformallyanalysetheeffectsoftheRTSacknowledgementsignalonQDIasynchronouscircuitsintermsofDPAresistance.
3.
1DifferentialPowerAnalysisAttackThefunctionalhypothesisofDPAattackistheexistingcorrelationbetweenthedataprocessedbythecircuitryanditspowerconsumption.
TherearethreemainphasesforprocessingtheDPAattack:thechoiceoftheselectionfunctionD,thedatacollectionphaseandthedataanalysisphase.
Phase1:Inthefirststep,theselectionfunctionisdefinedbyfindingblocksinthearchitecturewhichdependonsomepartsofthekey.
SuchafunctionintheDESalgorithmforexamplecanbedefinedasfollows:D(C1,P6,K0)=SBOX1(P6K0)C1=firstbitofSBOX1function.
P6=6-bitplain-text-inputoftheSBOX1function.
K0=6-bitofthefirstround'ssubkey:keytoguess.
SBOX1=asubstitutionfunctionofDESwitha4-bitoutput.
Phase2:ThesecondstepconsistsincollectingthediscretetimepowersignalSi(tj)andthecorrespondingciphertextoutputs(CTOi)foreachoftheNplaintextinputs(PTIi).
ThepowersignalSi(tj)representsthepowerconsumptionoftheselectionfunction:indexicorrespondstothePTIiplaintextstimulusandtimetjcorrespondstothetimewheretheanalysistakesplace.
Phase3:Therightkeyisguessedinthethirdphase.
AllcurrentsignalsSi(tj)aresplitintotwosetsaccordingtoaselectionfunctionD.
15ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsTheaveragepowersignalofeachsetisgivenby:Where|no|and|n1|representthenumberofpowersignalsSi(tj)respectivelyinsetS0andS1.
TheDPAbiassignalisobtainedby:IftheDPAbiassignalshowsimportantpeaks,itmeansthatthereisastrongcorrelationbetweentheDfunctionandthepowersignal,andsotheguessedkeyiscorrect.
Ifnot,theguessedkeyisincorrect.
SelectinganappropriateDfunctionisthenessentialinordertoguessagoodsecretkey.
Asillustratedabove,theselectionfunctionDcomputesattimetjduringtheciphering(ordeciphering)process,thevalueoftheattackedbit.
Whenthisvalueismanipulatedattimetj,therewillbeatthistime,adifferenceontheamountofdissipatedpoweraccordingtothebit'svalue(eitheroneorzero).
Let'sdefined0i(tj)theamountofdissipatedpowerwhentheattackedbitswitchesto0attimetjbyprocessingtheplaintextinputianddefined1i(tj)theamountofdissipatedpowerwhenthisbitswitchesto1.
Inreality,thevaluesofd0i(tj)andd1i(tj)correspondtothedissipatedpowerofalldata-pathswhichcontributetotheswitchingactivityoftheattackedbit.
EachoneofthesevalueshasitsweightineachaveragepowersignalA0(tj)andA1(tj).
AsthegoaloftheDPAattackistocomputethedifferencebetweenthesetwovalues,wecanexpresstheaveragepowersignalofthesebothsetsA0(tj)andA1(tj)by:(1)(3)(4)(2)(4)16F.
Bouesse,M.
Renaudin,G.
SicardInordertomakeanefficientanalysis,theamplitudeoftheDPAsignatureε(tj)mustbeashighaspossible.
Asimplewaytoguaranteethisistouseasignificantnumberofplaintextinputs(N).
Indeed,thenumberofPTIi(thenumberofpowersignalSi(tj))usedtoimplementtheattackenablestoreducetheeffectsofthenoisysignalsandtoincreasetheprobabilityofexcitingalldata-paths.
Itiswellknownthatthesignal-to-noiseratiofortheaveragedsignalincreasesasthesquarerootofthenumberofcurves.
σnoiseisthestandarddeviationofthenoiseIncreasingthenumberofplaintextinputs(PTIi)allowsustoensurethatalldata-pathswhichmakeswitchingto0orto1theattackedbitareexcited.
Thedealhere,istotakeintoconsiderationallpossiblequantitiesdxi(tj)whichrepresenttheswitchingcurrentoftheattackedbit.
Astheprobabilityofexcitingalldata-pathsisproportionaltoN,biggerthevalueofN,bettertheprobabilitytoexcitealldata-pathsoftheattackedbitis:misgenerallyunknownbythehackerandrepresentsthenumberofdata-paths.
Therefore,theknowledgeoftheimplementationwhichenablestochoosetheplaintextinputsandtheuseofhighqualityinstrumentationareassetsthatimprovetheDPAattack.
Infact,theyconsiderablyreducethenumberofdata(N)requiredforsucceedingtheattack.
3.
2TheRTSacknowledgementsignalThemethodweproposeinthispaperenablesthedesignertointroduceatemporalnoiseinthedesigninordertodesynchronizethetimerequiredforprocessingtheattackedbit.
Theideaoftheapproachistorandomlyshiftintimethecurrentprofileofthedesign.
Toachievethisgoal,werandomizetheacknowledgmentsignallatencyoftheblocksofthearchitecture.
Asillustratedinfigure5,weuseadelayelementcontrolledbyarandomnumbergenerator.
Thedesignoftherandomnumbergeneratorisoutofthescopeofthispaper.
True(5)17ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsTherefore,theDPAsignatureisexpressedby:randomnumbergenerator(TRNG)designisanimportanttopicandmanydifferenttypesofTRNGimplementationexist[9][10].
Fig.
5.
ImplementationofarandomacknowledgmentsignalLet'sdenotenthenumberofpossiblerandomdelaysimplementedinagivenarchitecture.
ndependsonthenumberofavailableacknowledgmentsignals(m)inthearchitectureandonthenumberofdelays(ki)implementedperacknowledgmentsignal.
The"n"valueiscomputedbythefollowingexpression:assumingcascadedmodules.
Iftheacknowledgmentsignalisrandomizedntimes,itmeansthatthevalueoftheattackedbitiscomputedatndifferenttimes(tj).
N/nrepresentsthenumberoftimestheattackedbitisprocessedatagiventimetjandN/2nrepresentsthenumberoftimesthequantitiesd0i(tj)andd1i(tj)ofthisbitcontributetosetS0andS1respectively.
IfweconsiderthattheNcurvesareequallysplitinbothsets(n0=n1=N/2),theaveragepowersignalofeachsetisnowexpressedby:TheDPAbiassignalisthengivenbythefollowingexpression:with;6)(6)18F.
Bouesse,M.
Renaudin,G.
SicardTheseexpressionsshowthat,insteadofhavingasinglequantityεx(tj),wehavendifferentsignificantquantitiesεx(tn)whichcorrespondtontimeswheretheattackedbitisprocessed.
Moreover,italsodemonstratesthateachquantityεx(tj)isdividedbyafactornasillustratedbythefollowingsimplification:withItmeansthat,althoughthenumberofsignificantpointsisincreasedbyn,thisapproachdividesbyntheaveragecurrentpeaksvariations.
ItoffersthepossibilitytobringdownthelevelofDPAbiassignalclosertocircuitry'snoise.
3.
2DiscussionLet'sforexampleimplementtheDPAattackusing1000plaintextinputs(N=1000).
Inthestandardapproachwheretheattackedbitisprocessedatauniquegiventime,weobtainanaverageof500currentcurvesforeachofthesetsS0andS1.
UsingourapproachwithRTSacknowledgmentsignalsandassumingn=16(forexample),weobtain16differentpoints(intermsoftime)wheretheattackedbitisprocessed.
Thereare62valuesdxi(tj)(N/ncurves)wherethisbitisprocessedattime(tj).
Eachsetthencontains31curves.
Whentheaveragepowersignalofeachsetiscalculated,valuesdxi(tj)are16timeslowerthanwithoutRTSacknowledgmentsignals.
Hence,thecontributionofdxi(tj)incurrentpeaksvariationsarereducedbyafactor16.
Therefore,tosucceedtheattackthehackerisobligedtosignificantlyincreasethenumberofacquisitions(N)ortoapplyacross-correlationfunctionwhichisexactlythegoaltoachieveintermsofattack'scomplexity.
Infact,cross-correlationremainsausefulmethodforsynchronizingdata.
Buttobefunctional,thehackermustidentifytheamountofcurrentprofileoftheattackedbit(dxi(tj))tobeusedasareference,andthencomputecross-correlationsinordertosynchronizeeachoftheNcurveswiththereference.
Knowingthat,thecross-correlationisappliedoninstantaneouscurrentcurveswhichcontainsignificantquantityofnoise.
Toincreasethedifficultyofthisanalysis,thevalueofncanbesignificantlyincreasedbydealingwiththevaluesofmandk.
Thevalueofmdependsonthearchitecture.
Itsvaluecanbeincreasedbyexpandingtheacknowledgmentsignalsofthearchitecture.
Eachbitorintermediatevalueofthedesigncanbeseparatelyacknowledged.
Thistechniqueenablesalsotoreducethedata-pathlatency.
(7)(8)19ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsThevaluesofthedelaydependonthetimespecificationtocipher/decipherdata.
Theyareboundedbythemaximumciphering/decipheringtime.
Consequently,theacknowledgementsignalsofanyasynchronousquasidelayinsensitivecircuitcanbeexploitedtointroducerandomdelaysandthereforeincreasetheDPAresistanceofthechips.
4CaseStudy:DESCrypto-processorThissectiondealswiththedifferentpossibilitiesofimplementingRTSacknowledgmentsignalsonQDIasynchronouscircuits.
TheDESwaschosenasanevaluationvectorbecausetheattackonthisalgorithmiswellknown.
Figure6representstheDEScorearchitecture,implementingafour-phasehandshakeprotocol,using1-to-Nencodeddataandbalanceddata-paths[2].
Thearchitectureiscomposedofthreeiterativeasynchronousloopssynchronizedthroughcommunicatingchannels.
Oneloopforthecipheringdata-path,thesecondforthekeydata-pathandthelastoneforthecontroldata-pathwhichenablesthecontrolofthesixteeniterationsofthealgorithm.
Forexamplelet'sapplythetechniquetothefivegreyblocksoffigure6.
Eachblockhasitsownacknowledgementsignalandthedelayinsertedineachacknowledgmentsignalcantakefourvalues.
Therefore,thereare1024possibledelayvalues(n=1024).
Itmeansthat(intermsofDPAresistance)thecurrentpeakvariationscorrespondingtodxi(tj)willbedividedby1024.
Fig.
6.
AsynchronousDEScorearchitecture20F.
Bouesse,M.
Renaudin,G.
Sicard5ResultsandAnalysis:ElectricalsimulationsElectricalsimulationsenableustoanalyzetheelectricalbehaviourofthedesignwithhighaccuracy,i.
e.
withoutdisturbingsignal(noise).
AllelectricalsimulationsareperformedwithNanosimusingtheHCMOS9designkit(0.
13!
m)fromSTMicroelectronics.
Thearchitectureusedfortheseelectricalanalysisimplementsoneacknowledgementsignalperblock.
However,fortheneedsofillustrationonlytheacknowledgmentsignaloftheinputsoftheSBOX1israndomlydelayedwith8differentdelays.
Thedefinedselectionfunction,usedtoimplementtheattack,isasfollows:D(Cn,P6,K0)=SBOX1(P6K0)withn∈{1,2,3,4}TheDPAattackhasbeenimplementedonthefouroutputbitsoftheSBOX1andonthefirstiterationoftheDESalgorithmusing64plaintextinputs(N=64).
Figure7showsthecurrentprofileofthefirstiterationwhentheRTSacknowledgmentsignalisactivatedanddeactivated.
Whenthedelayof13nsisused,thetimerequiredforprocessinganiteration(figure7-b)correspondstothetimerequiredtoprocess3iterationswithoutdelays(figure7-a).
Hencethecipheringtimeismultipliedbyafactor3.
Thisdelayischosenforthesakeofillustrationonly.
GivenalevelofDPAresistance,thedelaycanbestronglydecreasedinpractice(downtoafewnanosecondswiththistechnology)toreduceasmuchaspossiblethetimingoverheadaswellasthehardwareoverheadcausedbytheapplicationofthetechniqueFig.
7.
CurrentprofileoftheDESQDIasynchronousarchitecture.
21ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsOnlythefirstiterationsareconsideredb-withacorrectguessedkeyFig.
8.
ElectricalsignatureswhenperformedDPAattackonbit4oftheSBOX1.
Onlythefirstroundisconsideredandcomputedusingmorethan2.
100.
000point.
AstheSBOX1hasfouroutputbitsencodedindual-rail,wehave8data-paths(fromoutputstoinputs)whichenabletocompute8valuesofdxi(tj).
Let'srecallthat,dxi(tj)(d0i(tj);d1i(tj))correspondstotheamountofdissipatedpowerwhentheattackedbitisprocessedattimetj.
Forexample,let'sconsidertheoutputbit4oftheSBOX1.
Contrarytoastandardapproachandduetothe8delayshifts,thevaluesd04(tj)andd14(tj)areprocessed4timesinsteadofbeingprocessed32times,sothattheirweightsarereducedbyafactor8intosetsS1andS0.
EachofthissetenablesustocalculatetheaveragecurrentsΑ0(tj)andΑ1(tj).
22F.
Bouesse,M.
Renaudin,G.
SicardFigure8showstheseaveragecurrentprofiles(A0(tj)andA1(tj))whichareusedtocomputetheDPAbiassignal(S(tj)),alsoshowninfigure8.
PartIofthesecurvesrepresentthefirstencryptionoperationsinthefirstiteration(seefigure8).
ThispartisnotaffectedbytheRTSacknowledgmentsignalwhichisonlyappliedonSBOX1.
Infact,beforecomputingtheSBOXfunction,thechipfirstcomputesIP,ExpansionandXor48functions(figure6),sothat,inthefirstiteration,thesefunctions,arenotaffectedbytheRTSacknowledgementsignalofSBOX1.
ThisexplainswhytheamplitudeoftheaveragepowercurvestartsdecreasingafterpartIanditclearlyillustratestheeffectoftheRTSsignalonthepowercurves.
ThiscanofcoursebechangedbyactivatingtheRTSacknowledgementsignalsofblocksIP,Expansionand/orXor48.
Intheconsideredexample,64PTIicurvesareusedtoimplementtheattack.
Inthiscase,obtainingthekeybitfromtheDPAbiassignalisimpossibleasshowninfigure8.
Indeed,thereisnorelevantpeakintheDPAcurrentcurves(figure8-aand8-b).
6ConclusionThispaperpresentedacountermeasureagainstDPAbasedonrandomlytime-shiftedacknowledgmentsignalsofasynchronousQDIcircuits.
Theefficiencyofthecountermeasurewasfirsttheoreticallyformalizedandthendemonstratedusingelectricalsimulations.
ThetechniqueprinciplewasillustratedonaDESarchitecture.
generator.
7ReferencesM.
Wienered.
,Springer-Verlag,1999.
23ImprovingDPAresistanceofQuasiDelayInsensitiveCircuitsCryptology-Crypto99Proceedings,LectureNotesInComputerScienceVol.
1666,FutureworkswillbefocusedonthedesignandfabricationofaDESprototypeApril2002.
Manchester,U.
K.
implementingtheRTSacknowledgementsignalstogetherwitharandomnumberTemple,"SPA-ASynthesisableAmuletCoreforSmartcardApplications",ProceedingsoftheEighthInternationalSymposiumonAsynchronousCircuitsandbytheIEEEComputerSociety.
Systems(ASYNC2002).
Pages201-210.
Manchester,8-11/04/2002.
Published"ImprovingSmartCardSecurityusingSelf-timedCircuits",EighthInter-pp137-151,2003.
nationalSymposiumonAsynchronousCircuitsandsystems(ASYNC2002).
8-112.
SimonMoore,RossAnderson,PaulCunningham,RobertMullins,GeorgeTaylor,3.
L.
A.
Plana,P.
A.
Riocreux,W.
J.
Bainbridge,A.
Bardsley,J.
D.
GarsideandS.
4.
JacquesJ.
AFournier,SimonMoore,HuiyunLi,RobertMullins,andGerorge1.
P.
Kocher,J.
Jaffe,B.
Jun,"DifferentialPowerAnalysis,"AdvancesinTaylor,"SecurityEvalutionofAsunchronousCircuits",CHES2003,LNCS2779,5.
F.
Bouesse,M.
Renaudin,B.
Robisson,EBeigne,P.
Y.
Liardet,S.
Prevosto,J.
SystemsBordeaux,France,November24-26,2004.
2523,Springer,Berlin,Germany,ISBN3-540-00409-2,pp.
415-430.
3203,Springer,Berlin,Germany,pp.
555-564.
24Sonzogni,"DPAonQuasiDelayInsensitiveAsynchronouscircuits:ConcreteF.
Bouesse,M.
Renaudin,G.
SicardChicago,Illinois,USE,May10-11,1999.
AnalysisAttacksonSmartcards",USENIXWorkshoponSmartcardTechnology,8.
MarcRenaudin,"Asynchronouscircuitsandsystems:apromisingdesignResults",TobepublishedinXIXConferenceonDesignofCircuitsandIntegratedandmobility"(MIGAS2000),specialissueoftheMicroelectronics-EngineeringJournal,ElsevierScience,GUESTEditors:P;Senn,M.
Renaudin,J,Boussey,Vol.
6.
G.
F.
Bouesse,M.
Renaudin,S.
Dumont,F.
Germain,DPAonQuasiDelayHardwareandEmbeddedSystems(CHES2002),RedwoodShore,USA,LNCSNo.
RandomNumberGeneratorinAlteraStratixFPLDs,inJ.
Becker,M.
Platzner,S.
InsensitiveAsynchronousCircuits:FormalizationandImprovement,DATE2005.
Vernalde(Eds.
):"Field-ProgrammableLogicandApplications,"14thInternational54,N°1-2,December2000,pp.
133-149.
Conference,FPL2004,Antwerp,Belgium,August30-September1,2004,LNCSReconfigurableHardware,InC.
K.
Ko,andC.
Paar,(Eds.
):Cryptographicp.
4247.
T.
S.
MessergesandE.
A.
Dabbish,R.
H.
Sloan,"InvestigationsofPower9.
ViktorFischer,M.
Drutarovsk,TrueRandomNumberGeneratorEmbeddedinalternative",MicroelectronicforTelecommunications:managinghighcomplexity10.
V.
Fischer,M.
Drutarovsk,M.
imka,N.
Bochard,HighPerformanceTrue
感恩一年有你!免费领取2核4G套餐!2核4G轻量应用服务器2核 CPU 4GB内存 60G SSD云硬盘 6Mbps带宽领取地址:https://cloud.tencent.com/act/pro/lighthousethankyou活动规则活动时间2021年9月23日 ~ 2021年10月23日活动对象腾讯云官网已注册且完成实名认证的国内站用户(协作者与子用户账号除外),且符合以下活动条件:账号...
vinahost怎么样?vinahost是一家越南的主机商家,至今已经成13年了,企业运营,老牌商家,销售VPS、虚拟主机、域名、邮箱、独立服务器等,机房全部在越南,有Viettle和VNPT两个机房,其中VNPT机房中三网直连国内的机房,他家的产品优势就是100Mbps不限流量。目前,VinaHost商家发布了新的优惠,购买虚拟主机、邮箱、云服务器、VPS超过三个月都有赠送相应的时长,最高送半年...
Mineserver(ASN142586|UK CompanyNumber 1351696),已经成立一年半。主营香港日本机房的VPS、物理服务器业务。Telegram群组: @mineserver1 | Discord群组: https://discord.gg/MTB8ww9GEA7折循环优惠:JP30(JPCN2宣布产品可以使用)8折循环优惠:CMI20(仅1024M以上套餐可以使用)9折循...
nanosim剪卡为你推荐
虚拟主机服务你好,我自己做了一个网站,看到有的虚拟主机服务有数据库,有的没有,这个重要吗?我是新手,谢谢虚拟主机购买虚拟主机哪里购买的好?虚拟主机推荐便宜的虚拟主机,推荐几个域名备案买域名要备案吗网站空间价格1M网站空间是多少钱深圳网站空间怎样申请免费网站空间windows虚拟主机在windows 系统上装虚拟机有什么好的建议虚拟主机提供商找个比较好的虚拟主机提供商双线虚拟主机双线虚拟主机是智能的吗二级域名什么叫一级 二级域名
免费域名跳转 l5639 特价空间 42u机柜尺寸 12306抢票攻略 193邮箱 国外代理服务器软件 中国网通测速 网游服务器 闪讯官网 photobucket 买空间网 北京主机托管 美国vpn代理 hosting hosts文件修改 香港打折信息 tko 电脑主机 qq空间登入 更多