Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

University of South Florida

2017

Leakage power analysis attacks

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Exploiting On-Chip Voltage Regulators As A Countermeasure Against Power Analysis Attacks, Weize Yu May 2017

Exploiting On-Chip Voltage Regulators As A Countermeasure Against Power Analysis Attacks, Weize Yu

USF Tampa Graduate Theses and Dissertations

Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret key in a cryptographic circuit in feasible time without the need for expensive measurement equipment. Power analysis attacks (PAA) are a type of SCA that exploit the correlation between the leaked power consumption information and processed/stored data. Differential power analysis (DPA) and leakage power analysis (LPA) attacks are two types of PAA that exploit different characteristics of the side-channel leakage profile. DPA attacks exploit the correlation between the input data and dynamic power consumption of cryptographic circuits. Alternatively, LPA attacks utilize the correlation between the …