Author:
Pathak Jyotirmoy, ,Tripathi Suman Lata,
Abstract
The XOR gate is often used in cryptography modules. These cells' hardware implementations are subject to power analysis attacks. Correlation power attacks (CPAs) allow an attacker to estimate a highly correlated hypothetical value from the actual hidden value. By masking the input and unmaking the output, the present countermeasure technology randomises the power consumption pattern and increases the number of cells. We proposed the mask XOR gate in this study because they do not require cell unmasking and demonstrate a smaller correlation between power traces and input data.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mobile Edge Computing for Decentralized Systems;Decentralized Systems and Distributed Computing;2024-07-15
2. Mobile Edge Computing;Decentralized Systems and Distributed Computing;2024-07-15
3. Design, synthesis and implementation of 8-bit accumulator using FPGA Board;Proceedings of the 5th International Conference on Information Management & Machine Intelligence;2023-11-23
4. Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images;International Journal of Integrated Engineering;2023-08-28
5. FPGA for secured hardware & IP ownership;2022 IEEE International Conference of Electron Devices Society Kolkata Chapter (EDKCON);2022-11-26