Target Device

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 61350 Experts worldwide ranked by ideXlab platform

Hoi-jun Yoo - One of the best experts on this subject based on the ideXlab platform.

Amir Moradi - One of the best experts on this subject based on the ideXlab platform.

  • Template attacks on nano-scale CMOS Devices
    Journal of Cryptographic Engineering, 2020
    Co-Authors: Bastian Richter, Amir Moradi
    Abstract:

    Profiled attacks are widely considered to be the most powerful form of side-channel analysis attacks. A common form is known as Gaussian template attacks which fit a Gaussian distribution to better model the behavior of the Target Device. Since profiled attacks build the model based on a Device identical to the Target Device, manufacturing variances are an important factor for the success of such attacks. With shrinking the feature size, the influence of manufacturing variation on the power consumption of integrated circuits increases. It has been warned that this issue might render template attacks less effective. We evaluate this assumption on an ASIC design manufactured in 40 nm technology. We characterize the introduced variation and show that these can be easily mitigated. By performing attacks on multiple samples of the same ASIC, we show that template attacks on small technology sizes are still successful.

Michael Tunstall - One of the best experts on this subject based on the ideXlab platform.

  • Online template attacks
    Journal of Cryptographic Engineering, 2019
    Co-Authors: Lejla Batina, Łukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
    Abstract:

    Template attacks are a special kind of side-channel attacks that work in two stages. In a first stage, the attacker builds up a database of template traces collected from a Device which is identical to the attacked Device, but under the attacker’s control. In the second stage, traces from the Target Device are compared to the template traces to recover the secret key. In the context of attacking elliptic curve scalar multiplication with template attacks, one can interleave template generation and template matching and reduce the amount of template traces. This paper enhances the power of this technique by defining and applying the concept of online template attacks , a general attack technique with minimal assumptions for an attacker, who has very very limited control over the template Device. We show that online template attacks need only one power consumption trace of a scalar multiplication on the Target Device; they are thus suitable not only against ECDSA and static elliptic curve Diffie–Hellman (ECDH), but also against elliptic curve scalar multiplication in ephemeral ECDH. In addition, online template attacks need only one template trace per scalar bit and they can be applied to a broad variety of scalar multiplication algorithms. To demonstrate the power of online template attacks, we recover scalar bits of a scalar multiplication using the double-and-add-always algorithm on a twisted Edwards curve running on a smartcard with an ATmega163 CPU.

Gilles Grimaud - One of the best experts on this subject based on the ideXlab platform.

  • AhM of time deparment in ROM of a Java-OS
    Lecture Notes in Computer Science, 2005
    Co-Authors: Kevin Marquet, Alexandre Courbot, Gilles Grimaud
    Abstract:

    This article shows how it is possible to place a great part of a Java system in read-only memory in order to fit with the requirements of tiny Devices. Java systems for such Devices are commonly deployed off-board, then embedded on the Target Device in a ready-to-run form. Our approach is to go as far as possible in this deployment, in order to maximize the amount of data placed in read-only memory. Doing so, we are also able to reduce the overall size of the system.

  • ICESS - Ahead of time deployment in ROM of a Java-OS
    Embedded Software and Systems, 2005
    Co-Authors: Kevin Marquet, Alexandre Courbot, Gilles Grimaud
    Abstract:

    This article shows how it is possible to place a great part of a Java system in read-only memory in order to fit with the requirements of tiny Devices. Java systems for such Devices are commonly deployed off-board, then embedded on the Target Device in a ready-to-run form. Our approach is to go as far as possible in this deployment, in order to maximize the amount of data placed in read-only memory. Doing so, we are also able to reduce the overall size of the system.

  • Ahead of time deployment in ROM of a Java-OS
    2005
    Co-Authors: Kevin Marquet, Alexandre Courbot, Gilles Grimaud, David Simplot-ryl
    Abstract:

    This article shows how it is possible to place a great part of a Java system in read-only memory in order to fit with the requirements of tiny Devices. Java systems for such Devices are commonly deployed off-board, then embedded on the Target Device in a ready-to-run form. Our approach is reach an advanced state of deployment off-board, which allows us to maximize the amount of data placed in read-only memory. Doing so, we are also able to reduce the overall size of the system.

Rajesh Mehra - One of the best experts on this subject based on the ideXlab platform.

  • Optimized Design of CIC Decimator using Embedded LUTs of FPGA for Wireless Communication Systems
    2015
    Co-Authors: Rajesh Mehra, Swapna Devi
    Abstract:

    Abstract—In this paper an efficient multiplier less technique is presented to design a high speed CIC decimator for wireless applications like SDR and GSM. The implementation is based on efficient utilization of embedded LUTs of Target Device to enhance the speed of proposed design. It is an efficient method because the use of embedded LUTs not only increases the speed but also saves the resources on the Target Device. The fully pipelined CIC decimator is designed with Matlab, simulated with Modelsim, synthesized with Xilinx Synthesis Tool (XST), and implemented on Spartan-3E based XC3s500e-4fg320 Target Device. The proposed design can be operated at an estimated frequency of 206.2 MHz by consuming considerably less available resources of Target Device to provide cost effective solution for SDR applications. The power consumption of the proposed design is 0.08098W at 27.1°C junction temperature. Keywords—ASIC, CIC, FPGA, GSM, SD

  • FPGA-Based Design of High-Speed CIC Decimator for Wireless Applications
    2015
    Co-Authors: Rajesh Mehra, Rashmi Arora
    Abstract:

    Abstract — In this paper an efficient multiplier-less technique is presented to design and implement a high speed CIC decimator for wireless applications like SDR and GSM. The Cascaded Integrator Comb is a commonly used decimation filter which performs sample rate conversion (SRC) using only additions/subtractions. The implementation is based on efficient utilization of embedded LUTs of the Target Device to enhance the speed of proposed design. It is an efficient method used to design and implement CIC decimator because the use of embedded LUTs not only increases the speed but also saves the resources on the Target Device. The fully pipelined CIC decimator is designed with Matlab, simulated with Xilinx AccelDSP, synthesized with Xilinx Synthesis Tool (XST), and implemented on Virtex-II based XC2VP50-6 Target FPGA Device. The proposed design can operate at an estimated frequency of 276.6 MHz by consuming considerably less resources on Target Device to provide cost effective solution for SDR based wireless applications. Keywords- CIC; FPGA; FPGA; GSM; LUT; SDR. I

  • FPGA Design of Optimized CIC Interpolator for DSP based Wireless Communication Systems
    2010
    Co-Authors: Rajesh Mehra
    Abstract:

    In this paper an efficient multiplier less technique is presented to design and implement a high speed CIC interpolator for wireless applications like SDR and GSM. The implementation is based on efficient utilization of embedded LUTs of the Target Device to enhance the speed of proposed design. It is an efficient method used to design and implement CIC interpolator because the use of embedded LUTs not only increases the speed but also saves the resources on the Target Device. The fully pipelined CIC interpolator has been designed with Matlab, simulated with Modelsim, synthesized with Xilinx Synthesis Tool (XST), and implemented on Spartan-3E based XC3s500e- 4fg320 Target Device. The proposed design can be operated at an estimated frequency of 166.5 MHz by consuming very less resources available on Target Device to provide cost effective solution for wireless communication systems. The power consumption of the proposed design has been 0.08098W at 27.1 degree C junction temperature.