WO2013010362A1 - Integrated circuit and method for defending against power attack - Google Patents
Integrated circuit and method for defending against power attack Download PDFInfo
- Publication number
- WO2013010362A1 WO2013010362A1 PCT/CN2011/083060 CN2011083060W WO2013010362A1 WO 2013010362 A1 WO2013010362 A1 WO 2013010362A1 CN 2011083060 W CN2011083060 W CN 2011083060W WO 2013010362 A1 WO2013010362 A1 WO 2013010362A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- module
- data
- signal
- current
- integrated circuit
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
Definitions
- the present invention belongs to the field of information security circuits, and in particular relates to an integrated circuit and method for preventing power consumption attacks.
- the methods for defending power consumption attacks mainly include algorithm level protection and circuit level protection.
- the algorithm-level protection mechanism is mainly for the improvement of the algorithm. By introducing a randomly generated mask into the algorithm to hide the intermediate result, the internal signal of the chip is not related to the power consumption statistics of the encryption operation, thereby realizing the masking of the power consumption curve.
- the circuit-level protection mechanism mainly implements the power consumption curve for masking or disturbing the encryption operation through the circuit.
- the main implementation methods include standard cell libraries that are not related to power consumption, and random current consumption circuits.
- the basic idea of customizing the standard cell library that is not related to power consumption is to realize the constant power logic unit through full customization, so that the power consumption of the circuit is constant, which is irrelevant to the running algorithm and data, thus concealing the power consumption of the algorithm. curve.
- This way of implementation does not require the addition of additional auxiliary circuits, only the need to use a customized standard cell library in the circuit synthesis process Yes, but the full customization of the standard cell library is difficult.
- a lot of verification work is needed to ensure the correctness of the design.
- the present invention provides a method and an integrated circuit for preventing power consumption attacks, which adopts a combination of a true random number generator and a scrambling algorithm to make the random consumption circuit have high randomness, thereby realizing the work. Covering the consumption curve to improve the security and reliability of chip information communication.
- the present invention provides an integrated circuit for preventing power consumption attacks, comprising: a power supply (1), a power management module (2), an algorithm module (3), a storage unit (4), and a control logic unit (5).
- the integrated circuit includes an attack prevention module (6) for receiving a power signal VCCVVSS1 output by the power management module (2) and an instruction issued by the control logic unit (5); control logic The unit (5) is respectively connected to the algorithm module (3), the storage unit (4) and the anti-attack module (6);
- the power management module (2) receives the signal sent by the power supply (1) and outputs a power supply signal VCCVVSS1 after being internally converted, and the power supply signal VCCVVSS1 is used as the internal power supply domain as the algorithm module (3), the storage unit. (4), the control logic unit (5) and the The attack prevention module (6) supplies power;
- the control logic unit (5) also sends an instruction to the algorithm module (3) and receives a signal from the algorithm module (3); the algorithm module (3) is from the storage unit during operation ( Reading data in 4) and writing the result data and intermediate data into the storage unit (4); the control logic unit (5) writes to the storage unit (4) when performing an instruction operation or Read the data.
- the power management module (2) and the storage unit (4) are separately isolated; the algorithm module (Book 3) and the control logic unit (5) are put together , but isolated from other modules; the anti-attack module (6) is isolated from other circuits.
- the attack prevention module (6) comprises a bias circuit (7), an on-chip oscillator (8), a true random number generator (9), and a scrambling algorithm unit (10).
- the generator (9), the scrambling algorithm unit (10) are connected, and the true random number generator (9) is connected to the scrambling algorithm unit (10).
- the integrated circuit utilizes a guard ring to perform isolation between modules and units.
- the protection ring in the attack defense module (6) is set as follows:
- the bias circuit (7), the voltage-current conversion unit (11) and the current source array (12) are located The first guard ring; the on-chip oscillator (8) is located in the second guard ring; the true random number generator (9) is located in the third guard ring, and the scrambling algorithm unit (10) is located in the fourth Inside the protection ring.
- the bias circuit (7) is the voltage-current conversion unit (11), the on-chip oscillator (8), and the true random number generator (9) Provide bias voltage;
- the square wave signal output by the on-chip oscillator (8) provides a synchronous clock for the true random number generator (9) and the scrambling algorithm unit (10);
- the output of the true random number generator (9) is an N random input signal Xctrl[N:l] as an input of the scrambling algorithm unit (10), and the N random input signals are processed by a scrambling algorithm Then get N way control signal Yctrl[N:l] ;
- the voltage-current conversion unit (11) converts the voltage signal provided by the bias circuit (7) into a current bias signal as a current reference source of the current source array (12);
- the current source array (12) internally includes N current sources with unequal current values, each of which is controlled by a single switch, and the N-way control signal Yctrl[N:l output by the scrambling algorithm unit (10) Switching the N current sources of the current source array (12) separately.
- the bias circuit includes a bandgap reference source (13) and a voltage dividing circuit (14), wherein the stable DC voltage generated by the bandgap reference source (13) passes After the voltage dividing circuit (14) is processed, a reference voltage Vref is generated.
- the scrambling algorithm unit (10) includes a shift out-of-order module (16), an exclusive-OR module (17), and an N-bit register X-reg[N:l] (18). ), data replacement module 1 (19), data replacement module 11 (20), and combination module (21); a block, the XOR module, and the N-bit register X_reg[N:l] are sequentially connected; the N-bit register X_reg[N:l] is respectively associated with the data replacement module 1 (19) and data The replacement module 11 (20) is connected; the data replacement module 1 (19) and the data replacement module 11 (20) are both connected to the combination module (21).
- the scrambling algorithm unit uses a CMOS integrated circuit.
- the shift out-of-order module (16) performs shift out-of-order processing on the input N-bit data; the book exclusive OR module (17) will not perform shifting out of order Processing the N-bit data and shifting the N-bit data after the out-of-order processing to perform an exclusive-OR operation; the N-bit register X_reg[N:l] (18) stores the N-bit data after the XOR operation;
- the permutation module 1 (19) performs a permutation operation on the upper order data stored in the N-bit register X_reg[N:l](18) to obtain new high order data; the data replacement module 11(20) pair is stored in The low-fl bit data in the N-bit register X_reg[N:l](18) performs a permutation operation to obtain new low-order data; the combination module (21) obtains new high-fl bit data and new low-practice data. Combine and output.
- the data replacement module 1 (19) and the data replacement module 11 (20) respectively perform a replacement operation on the data using different permutation tables.
- a method for defending against power consumption attacks is provided, which is improved in that the method includes the following steps:
- the voltage-current conversion step is specifically:
- the voltage signal is converted into an electric book flow bias signal of the current source array, and the current source array copies the reference current into N current sources respectively controlled by the N-way switches, and the N current sources are not equal to each other.
- the N random input signal Xctrl[N:l] is a digital signal, and is represented by N-bit random input data Xctrl[N:l];
- the N-bit random input data Xctrl[N:l] is subjected to shift out-of-order processing to obtain shifting out-of-order data;
- N-bit data in the register X_reg[N:l] is divided into two parts, wherein the high N 2 bit data is subjected to the data replacement algorithm I to obtain new high order data, and the low N 2 bit data is passed through the data.
- Replacement Algorithm II obtains new low N/Z bit data;
- the present invention provides an integrated circuit and method for defensive power attack, and an anti-attack module is added to an integrated circuit for preventing power consumption attacks, thereby shielding the algorithm power consumption curve and improving security features.
- the method of adding an anti-attack module to the system realizes the shielding function of the algorithm power consumption line and improves the security characteristics of the system; the real random number generator is used as the control signal for changing the power consumption, and the power consumption is improved.
- the randomness achieves reliable shielding of the power consumption curve; the book adds a scrambling algorithm unit to the anti-attack module to implement the scrambling process on the random sequence, and further improves the reliability of the power consumption curve shielding;
- the layout of the integrated circuit with power consumption is reasonable, and the crosstalk of signals between modules is reduced, which ensures the integrity of the signal and the reliability of the function.
- Figure 1 is a schematic diagram of an integrated circuit that protects against power consumption attacks.
- Figure 2 shows the block diagram of the anti-attack module.
- Figure 3 is a block diagram of the structure of the bias circuit.
- FIG. 4 is a structural block diagram of a scrambling algorithm unit and a flow chart of the scrambling algorithm.
- Figure 5 shows the layout of an integrated circuit that protects against power consumption attacks.
- the integrated circuit for preventing power consumption attacks of the present invention is as shown in FIG. 1.
- the integrated circuit 1 for preventing power consumption attacks is composed of a power management module 2, an algorithm module 3, a storage unit 4, a control logic unit 5, and an attack defense module 6.
- the power supply VCC/VSS is an integrated circuit 1 and a power management module 2 for preventing power consumption attacks.
- the power supply after being internally converted by the power management module 2, outputs a power supply signal VCC3/VSS1 that is stable and has a certain driving capability.
- the VCC3/VSS1 serves as an internal power domain for powering the algorithm module 3, the storage unit 4, the control logic unit 5, and the attack defense module 6 in the system.
- the control logic unit 5 is responsible for transmitting instructions to the algorithm module 3 and the attack defense module 6, and receiving signals from the algorithm module 3.
- the algorithm module 3 reads data from the storage unit 4 during operation, and writes the output result data and intermediate data into the storage unit 4; the control logic unit 5 writes to the storage unit 4 when the instruction operation is performed.
- the data is simultaneously read from the storage unit 4 with the required data.
- the power domain of the power management module 2 is from the system power domain VCC/VSS, so that the power consumption curve information of the algorithm module 3 is reflected to the system power domain VCC/VSS. on.
- the system power domain can be monitored from the outside, so that external power consumption attack technology can steal key information such as the system key.
- the anti-attack module 6 is added to the integrated circuit 1 for preventing power consumption attacks.
- the anti-attack module 6 and the algorithm module 3 share a power domain.
- the power-shielding technology of the anti-attack module 6 can protect the operation process of the algorithm module 3. .
- the block diagram of the anti-attack module 6 is shown in FIG. 2.
- the main modules include a bias circuit 7, an on-chip oscillator 8, a true random number generator 9, a scrambling algorithm unit 10, a voltage-current conversion unit 11, and a current source array 12.
- the power domain of the attack defense module 6 is VCCVVSS1, which is from the power management module 2.
- the bias circuit 7 provides a stable bias voltage for the voltage-current conversion unit 11, the on-chip oscillator 8 and the true random number generator 9, and the on-chip oscillator 8 is an oscillation unit implemented by an on-chip integrated circuit.
- the output square wave signal of the on-chip oscillator 8 provides a synchronous clock for the true random number generator 9 and the scrambling algorithm unit 10;
- the true random number generator 9 is a true random number with high randomness based on the resistance noise characteristic.
- the randomness of the output sequence is related to the statistical characteristics of the resistance noise.
- the output of the true random number generator 9 is the N random input signal Xctrl[N:l] as the input of the scrambling algorithm unit 10, the N
- the path control signal is processed by the scrambling algorithm to obtain an N-way control signal number Yctrl[N:l] ;
- the voltage-current conversion unit 11 functions to convert the stable voltage signal provided by the bias circuit 7 into a stable current offset.
- the signal is used as the current reference source of the current source array 12; the current source array 12 internally contains N current sources with unequal current values, each of which is controlled by a single switch, and the N control signals output by the scrambling algorithm unit 10 Yctrl[N:l] controls the switches of the N current sources of the current source array 12, respectively.
- the random number sequence generated by the true random number generator is processed by the scrambling algorithm as a control signal of the current source array, and the power consumption consumed on the power supply also exhibits a random characteristic, thereby realizing the shielding function of the power consumption curve.
- 3 is a block diagram showing the structure of the bias circuit 7, mainly composed of a bandgap reference source 13 and a voltage dividing circuit 14.
- the bandgap reference source 13 can generate a DC voltage that has little relationship with the power supply and process parameters. The relationship between the DC voltage and the temperature is determined. The DC voltage value varies very little over the entire operating temperature range of the chip, up to O. The magnitude of lmV.
- the stable DC voltage generated by the bandgap reference source 13 is processed by the voltage dividing circuit 14, and the reference voltage value Vref required by the subsequent modules is generated. These reference voltage values also have high stability, and parameters such as power supply, process, and temperature. The sensitivity factor is very small.
- 4 is a block diagram showing the structure of the scrambling algorithm unit 10.
- the scrambling algorithm unit 10 includes a shift out-of-order module 16, an exclusive-OR module 17, an N-bit register X_reg[N:l] 18, and a data set. a replacement module 119, a data replacement module 1120, and a combination module 21; the shift out-of-order module, the XOR module, and the N-bit register X_reg[N:l] are sequentially connected; the N-bit register X_reg[ N: 1] is respectively connected to the data replacement module 119 and the data replacement module 1120; the data replacement module 119 and the data replacement module 1120 are both connected to the combination module 21.
- the shift out-of-order module 16 performs shift out-of-order processing on the input N-bit data; the XOR module 17 performs N-bit data that has not been subjected to shift out-of-order processing and N-bits after shifting out-of-order processing.
- Figure 5 is a layout layout of an integrated circuit 1 for protection against power consumption attacks, wherein the thick line frame represents a guard ring for isolating crosstalk on the layout.
- the power management 2 and the storage unit 4 are separately isolated; the algorithm module 3 and the control logic unit 5 in the digital circuit are placed together with other modules; the attack prevention module 6 is isolated from other circuits, and internal It is further divided into the following four parts: a bias circuit 7, a voltage-current conversion unit 11 and a current source array; an on-chip oscillator 8; a true random number generator 9; and a scrambling algorithm unit 10.
- a method for defending against power consumption attacks comprising the following steps: (1) After the attack prevention module 6 receives the power supply signal VCC3/VSS1, the bias circuit 7 generates a three-way bias voltage signal to be respectively transmitted to the voltage-current conversion unit 11, the on-chip oscillator. 8 and the true random number generator 9;
- the scrambling algorithm unit 10 processes the N-way random input signal Xctrl[N:l] and generates an N-way control signal Yctrl[N:l], and the N-book control signal Yctrl[N:l
- the N-way switches of the current source array 12 are separately controlled to generate random current consumption.
- the voltage-current conversion unit 11 converts the voltage signal into a current bias signal of the current source array 12, and the current source array 12 copies the reference current into N current sources respectively controlled by the N-way switch.
- the N current sources are not equal to each other.
- the N random input signal Xctrl[N:l] is a digital signal, which is represented by N-bit random input data Xctrl[N:l]; (3-1).
- the N-bit random input data Xctrl[N:l] is subjected to shift out-of-order processing to obtain shift out-of-order data;
- N-bit data in the register X_reg[N:l] is divided into two parts, wherein the high N 2 bit data is subjected to the data replacement algorithm I to obtain new high order data, and the low N 2 bit data is passed through the data.
- Replacement Algorithm II obtains new low N/Z bit data;
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Semiconductor Integrated Circuits (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR112014001209A BR112014001209A2 (en) | 2011-07-18 | 2011-11-28 | an integrated circuit and its method against power loss attack |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201120254254.8 | 2011-07-18 | ||
CN2011202542548U CN202189369U (en) | 2011-07-18 | 2011-07-18 | Integrated circuit capable of preventing power consumption attack |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013010362A1 true WO2013010362A1 (en) | 2013-01-24 |
Family
ID=45920806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2011/083060 WO2013010362A1 (en) | 2011-07-18 | 2011-11-28 | Integrated circuit and method for defending against power attack |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN202189369U (en) |
BR (1) | BR112014001209A2 (en) |
WO (1) | WO2013010362A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110908634A (en) * | 2019-11-13 | 2020-03-24 | 北京中电华大电子设计有限责任公司 | Random sequence generating device and control method thereof |
CN112035854A (en) * | 2020-08-13 | 2020-12-04 | 南京低功耗芯片技术研究院有限公司 | Cyclic shift and fixed permutation table power consumption attack resisting method based on bit permutation |
CN112699420A (en) * | 2020-12-31 | 2021-04-23 | 广州万协通信息技术有限公司 | Active shielding protection device and method for security chip |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102735985B (en) * | 2012-06-12 | 2016-05-25 | 福建睿矽微电子科技有限公司 | The anti-sniffer of random current type and anti-detection method |
CN103023636A (en) * | 2012-11-15 | 2013-04-03 | 北京昆腾微电子有限公司 | Voltage stabilizer capable of resisting power consumption analysis attack for code chip as well as code chip |
CN104283673A (en) * | 2014-10-09 | 2015-01-14 | 东南大学 | Random and dynamic voltage regulation anti-attack method for password circuit system and circuit system |
CN106503590B (en) * | 2016-10-17 | 2019-02-01 | 杭州国芯科技股份有限公司 | A kind of method chip anti-power consumption attack circuit and prevent power consumption attack |
CN108205349A (en) * | 2016-12-19 | 2018-06-26 | 北京兆易创新科技股份有限公司 | A kind of band-gap reference circuit |
CN107040364B (en) * | 2017-03-29 | 2020-05-08 | 北京华大信安科技有限公司 | Circuit for preventing power consumption attack |
CN109617668A (en) * | 2018-12-14 | 2019-04-12 | 四川长虹电器股份有限公司 | A method of preventing bypass attack |
CN110717201B (en) * | 2019-09-12 | 2021-06-11 | 华中科技大学 | Gaussian sampling circuit capable of resisting simple power consumption analysis attack |
CN112149065B (en) * | 2020-09-16 | 2023-12-05 | 北京中电华大电子设计有限责任公司 | Software defense fault injection method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427345A (en) * | 2001-12-19 | 2003-07-02 | 皇家菲利浦电子有限公司 | Method and apparatus for increasing circuit safety and preventing unauthorized use |
CN1485857A (en) * | 2002-09-27 | 2004-03-31 | 北京华虹集成电路设计有限责任公司 | Prevention method of encrypted integrated circuit against electrical source attack |
CN101025771A (en) * | 2006-02-17 | 2007-08-29 | 联想(北京)有限公司 | Security chip |
JP2010062635A (en) * | 2008-09-01 | 2010-03-18 | Sony Corp | Encryption processing apparatus and integrated circuit |
CN101695021A (en) * | 2009-10-22 | 2010-04-14 | 杭州晟元芯片技术有限公司 | System and method for resisting SPA/DPA attack |
-
2011
- 2011-07-18 CN CN2011202542548U patent/CN202189369U/en not_active Expired - Lifetime
- 2011-11-28 WO PCT/CN2011/083060 patent/WO2013010362A1/en active Application Filing
- 2011-11-28 BR BR112014001209A patent/BR112014001209A2/en not_active IP Right Cessation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427345A (en) * | 2001-12-19 | 2003-07-02 | 皇家菲利浦电子有限公司 | Method and apparatus for increasing circuit safety and preventing unauthorized use |
CN1485857A (en) * | 2002-09-27 | 2004-03-31 | 北京华虹集成电路设计有限责任公司 | Prevention method of encrypted integrated circuit against electrical source attack |
CN101025771A (en) * | 2006-02-17 | 2007-08-29 | 联想(北京)有限公司 | Security chip |
JP2010062635A (en) * | 2008-09-01 | 2010-03-18 | Sony Corp | Encryption processing apparatus and integrated circuit |
CN101695021A (en) * | 2009-10-22 | 2010-04-14 | 杭州晟元芯片技术有限公司 | System and method for resisting SPA/DPA attack |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110908634A (en) * | 2019-11-13 | 2020-03-24 | 北京中电华大电子设计有限责任公司 | Random sequence generating device and control method thereof |
CN112035854A (en) * | 2020-08-13 | 2020-12-04 | 南京低功耗芯片技术研究院有限公司 | Cyclic shift and fixed permutation table power consumption attack resisting method based on bit permutation |
CN112035854B (en) * | 2020-08-13 | 2024-02-23 | 南京低功耗芯片技术研究院有限公司 | Method for resisting power consumption attack based on cyclic shift of bit permutation and fixed permutation table |
CN112699420A (en) * | 2020-12-31 | 2021-04-23 | 广州万协通信息技术有限公司 | Active shielding protection device and method for security chip |
Also Published As
Publication number | Publication date |
---|---|
BR112014001209A2 (en) | 2017-06-13 |
CN202189369U (en) | 2012-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013010362A1 (en) | Integrated circuit and method for defending against power attack | |
Aghaie et al. | Impeccable circuits | |
Mozaffari-Kermani et al. | Reliable and error detection architectures of Pomaranch for false-alarm-sensitive cryptographic applications | |
Kumar et al. | EE-SPFAL: A novel energy-efficient secure positive feedback adiabatic logic for DPA resistant RFID and smart card | |
Hwang et al. | AES-Based Security Coprocessor IC in 0.18-$ muhbox m $ CMOS With Resistance to Differential Power Analysis Side-Channel Attacks | |
Kowsalya et al. | Low Area PRESENT Cryptography in FPGA Using TRNGPRNG Key Generation | |
Avital et al. | DPA-secured quasi-adiabatic logic (SQAL) for low-power passive RFID tags employing S-boxes | |
He et al. | A reliable strong PUF based on switched-capacitor circuit | |
Acosta et al. | Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview | |
Kumar et al. | An ASIC implementation of low power and high throughput blowfish crypto algorithm | |
CN112152777B (en) | Homomorphic cryptographic operation-oriented key conversion method, system, equipment and readable storage medium | |
Hou et al. | A lightweight LFSR-based strong physical unclonable function design on FPGA | |
Agwa et al. | Power efficient AES core for IoT constrained devices implemented in 130nm CMOS | |
Patranabis et al. | SCADFA: Combined SCA+ DFA attacks on block ciphers with practical validations | |
Anandakumar et al. | Efficient and lightweight FPGA-based hybrid PUFs with improved performance | |
Chong et al. | Dual-hiding side-channel-attack resistant FPGA-based asynchronous-logic AES: Design, countermeasures and evaluation | |
Backlund et al. | Secret key recovery attack on masked and shuffled implementations of crystals-kyber and saber | |
US11194933B2 (en) | Circuits supporting improved side channel and fault injection attack resistance | |
Gruber et al. | DOMREP–An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection | |
Rashidi | Low‐cost and two‐cycle hardware structures of PRINCE lightweight block cipher | |
Guanghui et al. | Chaotic image encryption based on running-key related to plaintext | |
Ng et al. | A highly secure FPGA-based dual-hiding asynchronous-logic AES accelerator against side-channel attacks | |
Cheng et al. | A reconfigurable and compact hardware architecture of CLEFIA block cipher with multi-configuration | |
Sanap et al. | An ultra-high throughput and efficient implementation of advanced encryption standard | |
Dhanuskodi et al. | Efficient register renaming architectures for 8-bit AES datapath at 0.55 pJ/bit in 16-nm FinFET |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11869549 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112014001209 Country of ref document: BR |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11869549 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 112014001209 Country of ref document: BR Kind code of ref document: A2 Effective date: 20140117 |
|
ENP | Entry into the national phase |
Ref document number: 112014001209 Country of ref document: BR Kind code of ref document: A2 Effective date: 20140117 |