{"data":{"id":"10.48550/arxiv.0710.4806","type":"dois","attributes":{"doi":"10.48550/arxiv.0710.4806","prefix":"10.48550","suffix":"arxiv.0710.4806","identifiers":[{"identifier":"0710.4806","identifierType":"arXiv"}],"alternateIdentifiers":[{"alternateIdentifierType":"arXiv","alternateIdentifier":"0710.4806"}],"creators":[{"name":"Tiri, Kris","nameType":"Personal","givenName":"Kris","familyName":"Tiri","affiliation":[],"nameIdentifiers":[]},{"name":"Verbauwhede, Ingrid","nameType":"Personal","givenName":"Ingrid","familyName":"Verbauwhede","affiliation":[],"nameIdentifiers":[]}],"titles":[{"title":"A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs"}],"publisher":"arXiv","container":{},"publicationYear":2007,"subjects":[{"lang":"en","subject":"Hardware Architecture (cs.AR)","subjectScheme":"arXiv"},{"subject":"FOS: Computer and information sciences","subjectScheme":"Fields of Science and Technology (FOS)"},{"subject":"FOS: Computer and information sciences","schemeUri":"http://www.oecd.org/science/inno/38235147.pdf","subjectScheme":"Fields of Science and Technology (FOS)"}],"contributors":[],"dates":[{"date":"2007-10-25T11:57:56Z","dateType":"Submitted","dateInformation":"v1"},{"date":"2011-11-09T20:17:19Z","dateType":"Updated","dateInformation":"v1"},{"date":"2007-10","dateType":"Available","dateInformation":"v1"},{"date":"2007","dateType":"Issued"}],"language":null,"types":{"ris":"RPRT","bibtex":"article","citeproc":"article-journal","schemaOrg":"ScholarlyArticle","resourceType":"Article","resourceTypeGeneral":"Text"},"relatedIdentifiers":[],"relatedItems":[],"sizes":[],"formats":[],"version":"1","rightsList":[{"rights":"Assumed arXiv.org perpetual, non-exclusive license to distribute this article for submissions made before January 2004","rightsUri":"http://arxiv.org/licenses/assumed-1991-2003/"}],"descriptions":[{"description":"This paper presents a digital VLSI design flow to create secure, side-channel attack (SCA) resistant integrated circuits. The design flow starts from a normal design in a hardware description language such as VHDL or Verilog and provides a direct path to a SCA resistant layout. Instead of a full custom layout or an iterative design process with extensive simulations, a few key modifications are incorporated in a regular synchronous CMOS standard cell design flow. We discuss the basis for side-channel attack resistance and adjust the library databases and constraints files of the synthesis and place \u0026amp; route procedures accordingly. Experimental results show that a DPA attack on a regular single ended CMOS standard cell implementation of a module of the DES algorithm discloses the secret key after 200 measurements. The same attack on a secure version still does not disclose the secret key after more than 2000 measurements.","descriptionType":"Abstract"},{"description":"Submitted on behalf of EDAA (http://www.edaa.com/)","descriptionType":"Other"}],"geoLocations":[],"fundingReferences":[],"xml":"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","url":"https://arxiv.org/abs/0710.4806","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"mds","isActive":true,"state":"findable","reason":null,"viewCount":0,"viewsOverTime":[],"downloadCount":0,"downloadsOverTime":[],"referenceCount":0,"citationCount":0,"citationsOverTime":[],"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":0,"created":"2022-03-21T04:58:41.000Z","registered":"2022-03-21T04:58:42.000Z","published":"2007","updated":"2022-03-21T04:58:42.000Z"},"relationships":{"client":{"data":{"id":"arxiv.content","type":"clients"}},"provider":{"data":{"id":"arxiv","type":"providers"}},"media":{"data":{"id":"10.48550/arxiv.0710.4806","type":"media"}},"references":{"data":[]},"citations":{"data":[]},"parts":{"data":[]},"partOf":{"data":[]},"versions":{"data":[]},"versionOf":{"data":[]}}}}