Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. Sensible data are ciphered by a secure key by which only the key holder can get the data. For this reason, to protect the cipher key against possible attacks becomes a main issue. The research activities in hardware cryptography are involved in finding new countermeasures against various attack scenarios and, in the same time, in studying new attack methodologies. During the PhD, three different logic families to counteract Power Analysis were presented and a novel class of attacks was studied. Moreover, two different activities related to Random Numbers Generators have been addressed.
Side-channel attacks and countermeasures in the design of secure IC's devices for cryptographic applications / Giancane, Luca. - (2011 Feb).
Side-channel attacks and countermeasures in the design of secure IC's devices for cryptographic applications
GIANCANE, LUCA
01/02/2011
Abstract
Abstract--- A lot of devices which are daily used have to guarantee the retention of sensible data. Sensible data are ciphered by a secure key by which only the key holder can get the data. For this reason, to protect the cipher key against possible attacks becomes a main issue. The research activities in hardware cryptography are involved in finding new countermeasures against various attack scenarios and, in the same time, in studying new attack methodologies. During the PhD, three different logic families to counteract Power Analysis were presented and a novel class of attacks was studied. Moreover, two different activities related to Random Numbers Generators have been addressed.File | Dimensione | Formato | |
---|---|---|---|
Giancane_PhD.pdf
accesso aperto
Note: Tesi di dottorato
Tipologia:
Tesi di dottorato
Licenza:
Creative commons
Dimensione
3.21 MB
Formato
Adobe PDF
|
3.21 MB | Adobe PDF |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.