• Aug 09, 2018 News![CFP] The annual meeting of IJFCC Editorial Board, ICCTD 2019, will be held in Prague, Czech Republic during March 2-4, 2019.   [Click]
  • Aug 09, 2018 News!IJFCC Vol. 6, No. 1-No. 3 has been indexed by EI (Inspec).   [Click]
  • Dec 24, 2018 News!The papers published in Vol.7, No.1-No.2 have all received dois from Crossref.
General Information
    • ISSN: 2010-3751
    • Frequency: Bimonthly (2012-2016); Quarterly (Since 2017)
    • DOI: 10.18178/IJFCC
    • Editor-in-Chief: Prof. Mohamed Othman
    • Executive Editor: Ms. Cherry L. Chan
    • Abstracting/ Indexing: Google Scholar,  Crossref, Electronic Journals LibraryEI (INSPEC, IET), etc.
    • E-mail:  ijfcc@ejournal.net 
Prof. Mohamed Othman
Department of Communication Technology and Network Universiti Putra Malaysia, Malaysia
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.
IJFCC 2012 Vol.1(2): 121-123 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2012.V1.31

Vulnerability Evaluation Method Considering Power Supply Environment for Power Analysis Attacks

Masaya Yoshikawa and Toshiya Asai

Abstract—At present, encryption hardware handling confidential information of integrated circuit (IC) cards or the similar are widely available. Confidential information is protected by encryption algorithms, and its safety is computationally secured. However, the problem of power analysis attacks has been actualized. Power analysis attacks acquire confidential information based on information of power consumption leaked from cryptographic circuits that are embedded in hardware. Therefore, when designing cryptographic circuits, resistance against side-channel attacks must be evaluated. The present study proposes a method to verify the resistance including power supply environment. The present study also verifies the validity of the proposed method through several evaluation experiments.

Index Terms—Vulnerability evaluation, Power analysis attack, Cryptographic circuit, Hardware security

The authors are with Meijo university, Japan (e-mail: dpa_cpa@yahoo.co.jp).


Cite: Masaya Yoshikawa and Toshiya Asai, "Vulnerability Evaluation Method Considering Power Supply Environment for Power Analysis Attacks," International Journal of Future Computer and Communication vol. 1, no. 2, pp. 121-123, 2012.

Copyright © 2008-2018. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net