[Resource Topic] 2011/412: Automatic Insertion of DPA Countermeasures

Welcome to the resource topic for 2011/412

Automatic Insertion of DPA Countermeasures

Authors: Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall


Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device and intermediate values within the computation. Randomization of intermediate values breaks statistical dependence and thus prevents such attacks. The current state of the art in countermeasures involves manual manipulation of low-level assembly language to insert random masking. This paper introduces an algorithm to automate the process allowing the development of compilers capable of protecting programs against DPA.

ePrint: https://eprint.iacr.org/2011/412

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .