{"title":"纠错和检测码在安全电路中的应用","authors":"V. Maingot, R. Leveugle","doi":"10.1109/RME.2007.4401858","DOIUrl":null,"url":null,"abstract":"When designing circuits for security-related applications, the robustness depends on its capability to globally resist to various types of attacks, based either on the observation of the device (e.g. differential power analysis) or its perturbation (e.g. injecting faults with a laser). To deal with perturbations, two strategies are developed: detecting the attack or maintaining the proper functioning of the device. This paper discusses characteristics of these two types of approaches when using information redundancy.","PeriodicalId":118230,"journal":{"name":"2007 Ph.D Research in Microelectronics and Electronics Conference","volume":"45 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"On the use of error correcting and detecting codes in secured circuits\",\"authors\":\"V. Maingot, R. Leveugle\",\"doi\":\"10.1109/RME.2007.4401858\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When designing circuits for security-related applications, the robustness depends on its capability to globally resist to various types of attacks, based either on the observation of the device (e.g. differential power analysis) or its perturbation (e.g. injecting faults with a laser). To deal with perturbations, two strategies are developed: detecting the attack or maintaining the proper functioning of the device. This paper discusses characteristics of these two types of approaches when using information redundancy.\",\"PeriodicalId\":118230,\"journal\":{\"name\":\"2007 Ph.D Research in Microelectronics and Electronics Conference\",\"volume\":\"45 7\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-07-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 Ph.D Research in Microelectronics and Electronics Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RME.2007.4401858\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 Ph.D Research in Microelectronics and Electronics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RME.2007.4401858","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the use of error correcting and detecting codes in secured circuits
When designing circuits for security-related applications, the robustness depends on its capability to globally resist to various types of attacks, based either on the observation of the device (e.g. differential power analysis) or its perturbation (e.g. injecting faults with a laser). To deal with perturbations, two strategies are developed: detecting the attack or maintaining the proper functioning of the device. This paper discusses characteristics of these two types of approaches when using information redundancy.