ATE370490T1 - Ausgewogene kryptographische rechenmethode und apparat zur schlupfminimierung in smartcards und anderen kryptosystemen - Google Patents

Ausgewogene kryptographische rechenmethode und apparat zur schlupfminimierung in smartcards und anderen kryptosystemen

Info

Publication number
ATE370490T1
ATE370490T1 AT99949533T AT99949533T ATE370490T1 AT E370490 T1 ATE370490 T1 AT E370490T1 AT 99949533 T AT99949533 T AT 99949533T AT 99949533 T AT99949533 T AT 99949533T AT E370490 T1 ATE370490 T1 AT E370490T1
Authority
AT
Austria
Prior art keywords
smartcards
cryptographic
leaky
computing method
cryptographic computing
Prior art date
Application number
AT99949533T
Other languages
English (en)
Inventor
Joshua Jaffe
Paul Kocher
Benjamin Jun
Original Assignee
Cryptography Res Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=22207806&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=ATE370490(T1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Cryptography Res Inc filed Critical Cryptography Res Inc
Application granted granted Critical
Publication of ATE370490T1 publication Critical patent/ATE370490T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/122Hardware reduction or efficient architectures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Credit Cards Or The Like (AREA)
  • Detergent Compositions (AREA)
  • Mobile Radio Communication Systems (AREA)
AT99949533T 1998-06-03 1999-06-03 Ausgewogene kryptographische rechenmethode und apparat zur schlupfminimierung in smartcards und anderen kryptosystemen ATE370490T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US8787998P 1998-06-03 1998-06-03

Publications (1)

Publication Number Publication Date
ATE370490T1 true ATE370490T1 (de) 2007-09-15

Family

ID=22207806

Family Applications (2)

Application Number Title Priority Date Filing Date
AT07075144T ATE548819T1 (de) 1998-06-03 1999-06-03 Symmetrisches kryptographisches rechenverfahren und vorrichtung zur verlustminimierung bei chipkarten und anderen verschlüsselungssystemen
AT99949533T ATE370490T1 (de) 1998-06-03 1999-06-03 Ausgewogene kryptographische rechenmethode und apparat zur schlupfminimierung in smartcards und anderen kryptosystemen

Family Applications Before (1)

Application Number Title Priority Date Filing Date
AT07075144T ATE548819T1 (de) 1998-06-03 1999-06-03 Symmetrisches kryptographisches rechenverfahren und vorrichtung zur verlustminimierung bei chipkarten und anderen verschlüsselungssystemen

Country Status (6)

Country Link
US (2) US6510518B1 (de)
EP (1) EP1088295B1 (de)
AT (2) ATE548819T1 (de)
AU (1) AU6238499A (de)
DE (1) DE69936856T2 (de)
WO (1) WO1999067766A2 (de)

Families Citing this family (114)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7587044B2 (en) * 1998-01-02 2009-09-08 Cryptography Research, Inc. Differential power analysis method and apparatus
WO1999035782A1 (en) * 1998-01-02 1999-07-15 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
WO1999067919A2 (en) * 1998-06-03 1999-12-29 Cryptography Research, Inc. Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
AU5458199A (en) 1998-07-02 2000-01-24 Cryptography Research, Inc. Leak-resistant cryptographic indexed key update
US6594760B1 (en) * 1998-12-21 2003-07-15 Pitney Bowes Inc. System and method for suppressing conducted emissions by a cryptographic device
AU2878800A (en) 1999-02-12 2000-08-29 Allen Freudenstein System and method for providing certification-related and other services
TW546935B (en) * 1999-08-30 2003-08-11 Nagracard Sa Multi-module encryption method
US6289455B1 (en) * 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
US20020029200A1 (en) 1999-09-10 2002-03-07 Charles Dulin System and method for providing certificate validation and other services
AU778750B2 (en) * 1999-09-24 2004-12-16 Identrust, Inc. System and method for providing payment services in electronic commerce
US6766455B1 (en) 1999-12-09 2004-07-20 Pitney Bowes Inc. System and method for preventing differential power analysis attacks (DPA) on a cryptographic device
FR2804524B1 (fr) * 2000-01-31 2002-04-19 Oberthur Card Systems Sas Procede d'execution d'un protocole cryptographique entre deux entites electroniques
CA2298990A1 (en) * 2000-02-18 2001-08-18 Cloakware Corporation Method and system for resistance to power analysis
EP1323061A1 (de) * 2000-08-14 2003-07-02 Peter H. Gien System und verfahren zur erleichterung von unterschriften durch käufer im e-commerce
AU2001290727A1 (en) * 2000-09-08 2002-03-22 Larry R. Miller System and method for transparently providing certificate validation and other services within an electronic transaction
US7072870B2 (en) * 2000-09-08 2006-07-04 Identrus, Llc System and method for providing authorization and other services
FR2813972B1 (fr) * 2000-09-14 2003-12-12 St Microelectronics Sa Procede de brouillage de la consommation electrique d'un circuit integre
US7620832B2 (en) * 2000-09-20 2009-11-17 Mips Technologies, Inc. Method and apparatus for masking a microprocessor execution signature
FR2818847A1 (fr) * 2000-12-26 2002-06-28 St Microelectronics Sa Circuit logique a polarite variable
JP2002247025A (ja) * 2001-02-22 2002-08-30 Hitachi Ltd 情報処理装置
US7023998B2 (en) * 2001-03-30 2006-04-04 Lucent Technologies Inc. Cryptographic key processing and storage
US7318145B1 (en) 2001-06-01 2008-01-08 Mips Technologies, Inc. Random slip generator
JP4596686B2 (ja) * 2001-06-13 2010-12-08 富士通株式会社 Dpaに対して安全な暗号化
US7490250B2 (en) * 2001-10-26 2009-02-10 Lenovo (Singapore) Pte Ltd. Method and system for detecting a tamper event in a trusted computing environment
JP3904432B2 (ja) 2001-11-16 2007-04-11 株式会社ルネサステクノロジ 情報処理装置
DE10202700A1 (de) * 2002-01-24 2003-08-07 Infineon Technologies Ag Vorrichtung und Verfahren zum Erzeugen eines Befehlscodes
US7840803B2 (en) * 2002-04-16 2010-11-23 Massachusetts Institute Of Technology Authentication of integrated circuits
DE10227618B4 (de) 2002-06-20 2007-02-01 Infineon Technologies Ag Logikschaltung
JP2004126841A (ja) * 2002-10-01 2004-04-22 Renesas Technology Corp プログラム実装方法
WO2004053684A2 (en) * 2002-12-12 2004-06-24 Arm Limited Processing activity masking in a data processing system
US7257718B2 (en) 2003-05-12 2007-08-14 International Business Machines Corporation Cipher message assist instructions
FR2855286B1 (fr) * 2003-05-22 2005-07-22 Gemplus Card Int Transmission securisee de donnees entre deux modules
JP3819872B2 (ja) * 2003-05-23 2006-09-13 株式会社東芝 論理演算装置
JP4038224B2 (ja) * 2003-05-27 2008-01-23 インターナショナル・ビジネス・マシーンズ・コーポレーション 省電力化阻害要因特定システム、情報処理装置、省電力化阻害要因特定方法、プログラム、及び記録媒体
DE10324049B4 (de) 2003-05-27 2006-10-26 Infineon Technologies Ag Integrierte Schaltung und Verfahren zum Betreiben der integrierten Schaltung
JP2005071320A (ja) * 2003-08-06 2005-03-17 Denso Corp 電源回路および半導体集積回路装置
DE10358358B4 (de) * 2003-12-12 2008-05-08 Infineon Technologies Ag Mikroprozessoranordnung und Verfahren zum Betreiben einer Mikroprozessoranordnung
DE102004063898B9 (de) * 2004-01-07 2012-12-20 Infineon Technologies Ag Übertragungsvorrichtung
DE102004001235B4 (de) * 2004-01-07 2005-12-15 Infineon Technologies Ag Übertragungsvorrichtung
EP1711887B1 (de) * 2004-01-27 2010-12-29 Nxp B.V. Schutz vor leistungsanalyse-angriffen
FR2867289A1 (fr) * 2004-03-02 2005-09-09 France Telecom Procede et dispositif pour accomplir une operation cryptographique
JP2006023957A (ja) * 2004-07-07 2006-01-26 Sony Corp 半導体集積回路及び情報処理装置
JP4589327B2 (ja) 2004-07-07 2010-12-01 三菱電機株式会社 電子素子及びデータ処理方法
KR100855958B1 (ko) * 2004-11-24 2008-09-02 삼성전자주식회사 해밍거리를 이용한 부가 채널 공격에 안전한 암호화시스템 및 방법
DE602004013206T2 (de) * 2004-12-01 2009-05-14 Telecom Italia S.P.A. Verfahren und diesbezügliche einrichtung zur hardwareorientierten umsetzung zwischen arithmetik- und boolscher zufallsmaskierung
EP1831812A1 (de) 2004-12-20 2007-09-12 Philips Intellectual Property & Standards GmbH Datenverarbeitungsvorrichtung und verfahren für den betrieb einer derartigen datenverarbeitungsvorrichtung
KR100725169B1 (ko) * 2005-01-27 2007-06-04 삼성전자주식회사 전력 분석 공격에 안전한 논리 연산 장치 및 방법
JP4700051B2 (ja) * 2005-03-16 2011-06-15 三菱電機株式会社 暗号装置及び暗号方法
US20060269066A1 (en) * 2005-05-06 2006-11-30 Schweitzer Engineering Laboratories, Inc. System and method for converting serial data into secure data packets configured for wireless transmission in a power system
KR20060119410A (ko) * 2005-05-20 2006-11-24 한국전자통신연구원 가변 정전압을 발생하는 장치 및 방법
US7840178B2 (en) * 2005-07-12 2010-11-23 Martin E. Hellman FM broadcast system competitive with satellite radio
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
FR2878390A1 (fr) * 2005-11-24 2006-05-26 Samsung Electronics Co Ltd Systeme et procede cryptographiques pour chiffrer des donnees d'entree
US8997255B2 (en) 2006-07-31 2015-03-31 Inside Secure Verifying data integrity in a data storage device
US8301890B2 (en) * 2006-08-10 2012-10-30 Inside Secure Software execution randomization
US7613907B2 (en) * 2006-08-11 2009-11-03 Atmel Corporation Embedded software camouflage against code reverse engineering
US7984301B2 (en) * 2006-08-17 2011-07-19 Inside Contactless S.A. Bi-processor architecture for secure systems
US8352752B2 (en) * 2006-09-01 2013-01-08 Inside Secure Detecting radiation-based attacks
US7554865B2 (en) * 2006-09-21 2009-06-30 Atmel Corporation Randomizing current consumption in memory devices
JP2008099204A (ja) * 2006-10-16 2008-04-24 Toshiba Corp 論理回路
JP5203594B2 (ja) * 2006-11-07 2013-06-05 株式会社東芝 暗号処理回路及び暗号処理方法
CN101187963B (zh) * 2006-11-15 2010-05-12 北京同方微电子有限公司 一种对抗差分功耗分析的逻辑单元
US7822207B2 (en) * 2006-12-22 2010-10-26 Atmel Rousset S.A.S. Key protection mechanism
JP4851947B2 (ja) * 2007-01-29 2012-01-11 株式会社東芝 論理回路
US8824672B1 (en) * 2007-04-12 2014-09-02 Iowa State University Research Foundation Reconfigurable block encryption logic
JP4901564B2 (ja) * 2007-04-18 2012-03-21 三菱電機株式会社 分割テーブル作成装置及び分割テーブル作成プログラム
GB2453367A (en) * 2007-10-04 2009-04-08 Univ Newcastle Cryptographic processing using isomorphic mappings of Galois fields
JP5513410B2 (ja) * 2008-01-18 2014-06-04 アイデントラスト, インコーポレイテッド 複数の信頼ドメインへのデジタル証明書のバインディング
JPWO2009118829A1 (ja) * 2008-03-25 2011-07-21 三菱電機株式会社 暗号演算装置及び暗号演算プログラム及び記録媒体
FR2929470B1 (fr) * 2008-03-25 2010-04-30 Groupe Ecoles Telecomm Procede de protection de circuit de cryptographie programmable, et circuit protege par un tel procede
EP2316189B1 (de) * 2008-08-19 2016-03-30 Nxp B.V. Verfahren zur erzeugung eines nachrichtenauthentifizierungskodes auf verschlüsselungsbasis
JP4687775B2 (ja) * 2008-11-20 2011-05-25 ソニー株式会社 暗号処理装置
DE102009027086A1 (de) * 2009-06-23 2010-12-30 Robert Bosch Gmbh Vorrichtung und Verfahren zur Bildung einer Signatur
EP2290872B1 (de) 2009-08-27 2014-06-18 Nxp B.V. Vorrichtung zur Erzeugung eines Nachrichtenauthentifizierungscodes zur Authentifizierung einer Nachricht
CN102725737B (zh) 2009-12-04 2016-04-20 密码研究公司 可验证防泄漏的加密和解密
US8539254B1 (en) 2010-06-01 2013-09-17 Xilinx, Inc. Method and integrated circuit for protecting against differential power analysis attacks
US8966253B1 (en) 2010-06-01 2015-02-24 Xilinx, Inc. Method and apparatus for authenticating a programmable device bitstream
DE102010029735A1 (de) * 2010-06-07 2011-12-08 Robert Bosch Gmbh Verfahren zum Generieren eines Bitvektors
US8583944B1 (en) 2010-08-04 2013-11-12 Xilinx, Inc. Method and integrated circuit for secure encryption and decryption
US8832462B2 (en) 2010-09-08 2014-09-09 Xilinx, Inc. Protecting against differential power analysis attacks on sensitive data
US8650408B2 (en) 2010-09-08 2014-02-11 Xilinx, Inc. Protecting against differential power analysis attacks on decryption keys
US9250671B2 (en) 2011-02-16 2016-02-02 Honeywell International Inc. Cryptographic logic circuit with resistance to differential power analysis
US8909941B1 (en) 2011-03-31 2014-12-09 Xilinx, Inc. Programmable integrated circuit and a method of enabling the detection of tampering with data provided to a programmable integrated circuit
US8525545B1 (en) 2011-08-26 2013-09-03 Lockheed Martin Corporation Power isolation during sensitive operations
US8624624B1 (en) 2011-08-26 2014-01-07 Lockheed Martin Corporation Power isolation during sensitive operations
US8635467B2 (en) 2011-10-27 2014-01-21 Certicom Corp. Integrated circuit with logic circuitry and multiple concealing circuits
US8334705B1 (en) 2011-10-27 2012-12-18 Certicom Corp. Analog circuitry to conceal activity of logic circuitry
US8842824B2 (en) * 2011-11-28 2014-09-23 Nec Corporation Encryption processing circuit and decryption processing circuit, methods thereof, and programs thereof
US8924740B2 (en) 2011-12-08 2014-12-30 Apple Inc. Encryption key transmission with power analysis attack resistance
CN104204991B (zh) * 2012-03-30 2018-01-02 英特尔公司 将较小的已排序向量合并和排序为较大的已排序向量的指令的方法和装置
US10103876B2 (en) 2012-10-17 2018-10-16 Synopsys, Inc. System and method for multichannel cryptographic processing
FR2998693B1 (fr) 2012-11-29 2015-03-13 Spirtech Procede de derivation de cles cryptographiques multiples a partir d'une cle maitresse dans un microprocesseur de securite
JP2016517597A (ja) * 2013-03-15 2016-06-16 パワー フィンガープリンティング インコーポレイテッド コンピュータベースのシステムに電力指紋付けシステムを使用して保全性評価を強化するシステム、方法、及び装置
US9009495B2 (en) 2013-06-28 2015-04-14 Envieta, LLC High speed cryptographic combining system, and method for programmable logic devices
US9871651B2 (en) * 2014-06-16 2018-01-16 Cisco Technology, Inc. Differential power analysis countermeasures
KR102446866B1 (ko) 2014-08-28 2022-09-23 삼성전자주식회사 부채널 공격을 방지하는 암복호화기 및 이의 구동 방법 그리고 이를 포함하는 제어 장치
US9268938B1 (en) 2015-05-22 2016-02-23 Power Fingerprinting Inc. Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection
GB2544452B (en) * 2015-08-26 2019-09-11 Advanced Risc Mach Ltd Data processing systems
EP3384422B1 (de) 2015-12-02 2021-02-24 Cryptography Research, Inc. Freeze-logik
US10789358B2 (en) 2015-12-17 2020-09-29 Cryptography Research, Inc. Enhancements to improve side channel resistance
EP3214566B1 (de) 2016-03-01 2018-09-12 Siemens Aktiengesellschaft Verhinderung von seitenkanalangriffen auf einer cpu
US10255462B2 (en) 2016-06-17 2019-04-09 Arm Limited Apparatus and method for obfuscating power consumption of a processor
CA3029619C (en) * 2016-07-01 2022-12-06 American Express Travel Related Services Company, Inc. Systems and methods for validating transmissions over communication channels
US20180089426A1 (en) * 2016-09-29 2018-03-29 Government Of The United States As Represented By The Secretary Of The Air Force System, method, and apparatus for resisting hardware trojan induced leakage in combinational logics
JP6917716B2 (ja) * 2017-01-23 2021-08-11 ソニーセミコンダクタソリューションズ株式会社 固体撮像装置及び固体撮像装置の情報処理方法
US10200192B2 (en) 2017-04-19 2019-02-05 Seagate Technology Llc Secure execution environment clock frequency hopping
US10459477B2 (en) 2017-04-19 2019-10-29 Seagate Technology Llc Computing system with power variation attack countermeasures
US10270586B2 (en) 2017-04-25 2019-04-23 Seagate Technology Llc Random time generated interrupts in a cryptographic hardware pipeline circuit
US10771236B2 (en) 2017-05-03 2020-09-08 Seagate Technology Llc Defending against a side-channel information attack in a data storage device
US10511433B2 (en) 2017-05-03 2019-12-17 Seagate Technology Llc Timing attack protection in a cryptographic processing system
US10997322B2 (en) 2017-05-22 2021-05-04 Arm Limited Efficient power distribution
US10924261B2 (en) 2017-05-22 2021-02-16 Arm Limited Efficient power distribution
US11308239B2 (en) 2018-03-30 2022-04-19 Seagate Technology Llc Jitter attack protection circuit
US11394308B1 (en) 2021-05-05 2022-07-19 Arm Limited Apparatuses and methods for power isolation

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4107458A (en) * 1976-08-23 1978-08-15 Constant James N Cipher computer and cryptographic system
US4139839A (en) * 1977-03-18 1979-02-13 Nasa Digital data reformatter/deserializer
US4605921A (en) * 1983-06-20 1986-08-12 Riddle Herbert S Digital word-framing technique and system
US4569052A (en) * 1983-07-14 1986-02-04 Sperry Corporation Coset code generator for computer memory protection
JPH01114995A (ja) 1987-10-29 1989-05-08 Toppan Printing Co Ltd Icカード
JPH022475A (ja) 1988-06-15 1990-01-08 Omron Tateisi Electron Co Icカード
DE3825880C1 (de) * 1988-07-29 1995-12-21 Siemens Ag Schlüsseleinrichtung
US5144667A (en) * 1990-12-20 1992-09-01 Delco Electronics Corporation Method of secure remote access
US5710834A (en) * 1995-05-08 1998-01-20 Digimarc Corporation Method and apparatus responsive to a code signal conveyed through a graphic image
US5551013A (en) * 1994-06-03 1996-08-27 International Business Machines Corporation Multiprocessor for hardware emulation
US5511123A (en) 1994-08-04 1996-04-23 Northern Telecom Limited Symmetric cryptographic system for data encryption
JP3336826B2 (ja) * 1995-09-29 2002-10-21 株式会社デンソー 盗難防止装置

Also Published As

Publication number Publication date
US6654884B2 (en) 2003-11-25
WO1999067766A8 (en) 2000-07-27
EP1088295B1 (de) 2007-08-15
WO1999067766A3 (en) 2000-04-06
EP1088295A4 (de) 2005-04-20
DE69936856T2 (de) 2008-04-30
WO1999067766A2 (en) 1999-12-29
DE69936856D1 (de) 2007-09-27
US20030140240A1 (en) 2003-07-24
US6510518B1 (en) 2003-01-21
AU6238499A (en) 2000-01-10
EP1088295A2 (de) 2001-04-04
ATE548819T1 (de) 2012-03-15

Similar Documents

Publication Publication Date Title
ATE370490T1 (de) Ausgewogene kryptographische rechenmethode und apparat zur schlupfminimierung in smartcards und anderen kryptosystemen
Moore et al. Improving smart card security using self-timed circuits
US7292060B2 (en) Logic circuit and method thereof
Prouff et al. Statistical analysis of second order differential power analysis
JP2013138496A (ja) 処理装置に対する特異な電力攻撃を最小限にする方法および装置
Kabin et al. Horizontal address-bit DPA against montgomery kP implementation
Sengupta et al. Guest editorial securing IoT hardware: threat models and reliable, low-power design solutions
Kim et al. Analysis of cyber attacks and security intelligence
CN111046381A (zh) 一种嵌入式cpu抗差分功耗分析装置及方法
Kabin et al. Methods increasing inherent resistance of ECC designs against horizontal attacks
Frieslaar et al. Developing an electromagnetic noise generator to protect a Raspberry Pi from side channel analysis
Athanasiou et al. Masking feedforward neural networks against power analysis attacks
US10474431B2 (en) Device and method for multiplication for impeding side-channel attacks
Zhang et al. On Trojan side channel design and identification
Mahanta et al. Differential power analysis: Attacks and resisting techniques
CN109993005A (zh) 对cpu总线的数据信号加解扰的方法及装置
Kastner et al. Quantifying hardware security using joint information flow analysis
EP1802024A3 (de) Symmetrisches kryptographisches Rechenverfahren und Vorrichtung zur Verlustminimierung bei Chipkarten und anderen Verschlüsselungssystemen
Gligor Dancing with the adversary: a tale of wimps and giants
Rahaman et al. Side channel attack prevention for AES smart card
Iavich et al. Novel Method of Hardware Security Problems Identification
Kunz-Jacques et al. The Davies-Murphy Power Attack
Sutherland et al. CPU covert channel accessible from JavaScript
Feix et al. Defeating embedded cryptographic protocols by combining second-order with brute force
Chhabra et al. Analysis of aes cryptosystem in the existence of hardware trojan

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties