By Topic

Side-channel attack mitigation using dual-spacer Dual-rail Delay-insensitive Logic (D3L)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Cilio, W. ; Dept. of Comput. Sci. Comput. Eng., Univ. of Arkansas, Fayetteville, AR, USA ; Linder, M. ; Porter, C. ; Jia Di
more authors

Side-channel attacks have become a threat to secure electronic circuits, due to the strong correlation between data pattern and leaking power/timing information. By monitoring the power/timing behavior of a synchronous circuit, an attacker can easily obtain the secret data stored in the device. Although dual-rail asynchronous circuits have more stable power traces, they still show power fluctuation because of the imbalanced load between two rails. Moreover, asynchronous circuits are the most prone to timing attacks since delay is data dependent. Dual-spacer Dual-rail Delay-insensitive Logic (D3L), presented in this paper, is able to mitigate power and timing based side-channel attacks. Power fluctuation is decoupled from data pattern by the use of a dual-spacer protocol, while timing-data correlation is broken by insertion of random delays.

Published in:

IEEE SoutheastCon 2010 (SoutheastCon), Proceedings of the

Date of Conference:

18-21 March 2010