Presentation Type

Secured Microchip Design: Side Channel Attack and its Countermeasure


Presentation Menu


Banking, defence applications and cryptosystems often demand security features, including cryptography, tamper resistance, stealth, and etc., by means of hardware approaches and/or software approaches to prevent data leakages. The side channel attacks (SCAs) have been employed to extract the secret keys of the encrypted algorithms implemented in hardware devices by analyzing their physical leakage parameters such as power dissipation, electromagnetic interference, timing and acoustic information.