Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/147414
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYli-Mäyry, Villeen_US
dc.contributor.authorUeno, Reien_US
dc.contributor.authorMiura, Noriyukien_US
dc.contributor.authorNagata, Makotoen_US
dc.contributor.authorBhasin, Shivamen_US
dc.contributor.authorMathieu, Yvesen_US
dc.contributor.authorGraba, Tariken_US
dc.contributor.authorDanger, Jean-Lucen_US
dc.contributor.authorHomma, Naofumien_US
dc.date.accessioned2021-04-08T06:04:30Z-
dc.date.available2021-04-08T06:04:30Z-
dc.date.issued2020-
dc.identifier.citationYli-Mäyry, V., Ueno, R., Miura, N., Nagata, M., Bhasin, S., Mathieu, Y., Graba, T., Danger, J. & Homma, N. (2020). Diffusional side-channel leakage from unrolled lightweight block ciphers : a case study of power analysis on PRINCE. IEEE Transactions On Information Forensics and Security, 16, 1351-1364. https://dx.doi.org/10.1109/TIFS.2020.3033441en_US
dc.identifier.issn1556-6021en_US
dc.identifier.other0000-0002-9754-6792-
dc.identifier.other0000-0002-0072-6114-
dc.identifier.other0000-0002-0625-9107-
dc.identifier.other0000-0001-5063-7964-
dc.identifier.other0000-0003-0864-3126-
dc.identifier.urihttps://hdl.handle.net/10356/147414-
dc.description.abstractThis study investigates a new side-channel leakage observed in the inner rounds of an unrolled hardware implementation of block ciphers in a chosen-input attack scenario. The side-channel leakage occurs in the first round and it can be observed in the later inner rounds because it arises from path activation bias caused by the difference between two consecutive inputs. Therefore, a new attack that exploits the leakage is possible even for unrolled implementations equipped with countermeasures (masking and/or deglitchers that separate the circuit in terms of glitch propagation) in the round involving the leakage. We validate the existence of such a unique side-channel leakage through a set of experiments with a fully unrolled PRINCE cipher hardware, implemented on a field-programmable gate array (FPGA). In addition, we verify the validity and evaluate the hardware cost of a countermeasure for the unrolled implementation, namely the Threshold Implementation (TI) countermeasure.en_US
dc.language.isoenen_US
dc.relation.ispartofIEEE Transactions on Information Forensics and Securityen_US
dc.rights© 2020 The Author(s). Published by Institute of Electrical and Electronics Engineers (IEEE). This work is licensed under a Creative Commons Attribution 4.0 License.en_US
dc.subjectEngineering::Computer science and engineeringen_US
dc.titleDiffusional side-channel leakage from unrolled lightweight block ciphers : a case study of power analysis on PRINCEen_US
dc.typeJournal Articleen
dc.contributor.researchTemasek Laboratories @ NTUen_US
dc.identifier.doi10.1109/TIFS.2020.3033441-
dc.description.versionPublished versionen_US
dc.identifier.scopus2-s2.0-85097795534-
dc.identifier.volume16en_US
dc.identifier.spage1351en_US
dc.identifier.epage1364en_US
dc.subject.keywordsHardware Securityen_US
dc.subject.keywordsCiphersen_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:TL Journal Articles

SCOPUSTM   
Citations 50

3
Updated on Mar 25, 2023

Web of ScienceTM
Citations 50

2
Updated on Mar 27, 2023

Page view(s)

230
Updated on Mar 29, 2023

Download(s) 50

31
Updated on Mar 29, 2023

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.