Bouesse, G.F., Sicard, G., Renaudin, M.: Path swapping method to improve DPA resistance of quasi delay insensitive asynchronous circuits. In: Goubin, L., Matsui, M. (eds.) CHES. Lecture Notes in Computer Science, vol. 4249, pp. 384–398. Springer, Berlin (2006)
Braibant, T.: Coquet: a coq library for verifying hardware. In: Jouannaud, J.-P., Shao, Z. (eds.) CPP. Lecture Notes in Computer Science, vol. 7086, pp. 330–345. Springer, Berlin (2011)
Chen, Z., Zhou, Y.: Dual-rail random switching logic: a countermeasure to reduce side channel leakage. In: CHES, October 10–13, Yokohama, Japan. LNCS, vol. 4249, pp. 242–254. Springer, Berlin (2006). doi:10.1007/11894063_20
Common Criteria ($aka$ CC) for Information Technology Security Evaluation (ISO/IEC 15408) (2013). http://www.commoncriteriaportal.org/
The Coq Development Team. The Coq Proof Assistant Reference Manual Version 7.2. INRIA-Rocquencourt, December 2001. http://coq.inria.fr/doc-eng.html
Coupet-Grimal, S., Jakubiec, L.: Certifying circuits in type theory. Formal Aspects Comput. 16(4), 352–373 (2004)
MATH
Article
Google Scholar
Danger, J.-L., Guilley, S., Bhasin, S., Nassar, M.: Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors—new attacks and improved counter measures. In: SCS, 6–8 November, Jerba, Tunisia, pp. 1–8. IEEE, New York (2009). doi:10.1109/ICSCS.2009.5412599
He, W., de la Torre, E., Riesgo, T.: An interleaved EPE-immune PA-DPL structure for resisting concentrated EM side channel attacks on FPGA implementation. In: Schindler, W., Huss, S.A. (eds.) COSADE. Lecture Notes in Computer Science, vol. 7275, pp. 39–53. Springer, Berlin (2012)
Nassar, M., Bhasin, S., Danger, J.-L., Duc, G., Guilley, S.: BCDL: a high performance balanced DPL with global precharge and without early-evaluation. In: DATE’10, 8–12 March 2010, Dresden, Germany, pp. 849–854. IEEE Computer Society, New York (2010)
Nikova, S., Rijmen, V., Schläffer, M.: Secure hardware implementation of non-linear functions in the presence of glitches. In: ICISC, Seoul, Korea. Lecture Notes in Computer Science, vol. 5461, pp. 218–234. Springer, Berlin (2008)
Paulin-Mohring, C.: Circuits as streams in Coq : verification of a sequential multiplier. In: Berardi, S., Coppo, M. (eds.) Types for Proofs and Programs, TYPES’95. Lecture Notes in Computer Science, vol. 1158 (1996)
Popp, T., Mangard, S.: Masked dual-rail pre-charge logic: DPA-resistance without routing constraints. In: CHES. LNCS, vol. 3659, pp. 172–186 (2005). doi:10.1007/11545262_13
Quémard, J.-P.: Cryptographic algorithms and security mechanisms conformance testing, 10 2010. N10801 NWIP, Draft 6 ISO/IEC JTC 1/SC 27 N
Soares, R., Calazans, N., Lomné, V., Maurine, P., Torres, L., Robert, M.: Evaluating the robustness of secure triple track logic through prototyping. In: SBCCI’08: Proceedings of the 21st Symposium on Integrated Circuits and System Design, Gramado, Brazil, pp. 193–198. ACM, New York (2008)
Tiri, K., Verbauwhede, I.: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: Proceedings of DATE’2004, Paris, France, pp. 246–251 (2004)