This paper implements our proposed charge-sharing symmetric adiabatic logic (CSSAL) into the cellular multiplier used in finite field over GF(2m) arithmetic using secure system for resistant against side-channel attacks. To validate our proposed logic, we have evaluated the current traces and energy dissipation of the individual secure adiabatic logics; proposed CSSAL, secure adiabatic logic, symmetric adiabatic logic, 2N-2N2P, and the conventional three-phase dual-rail pre-charged logic. Furthermore, the thoroughly investigation and comparative study on the logic's resistance and the energy efficiency in the multiplier over GF(2m) have been conducted. Based on the obtained SPICE simulation results, we deduce that, the proposed typical logics is stronger against differential power analysis and more robust for differential electromagnetic analysis attacks, because it consumes constant low power and uniformly low peak current since ever in the literature.
展开▼
机译:本文使用安全系统将我们提出的电荷共享对称绝热逻辑(CSSAL)应用于有限域上的GF(2 m sup>)算法的蜂窝乘法器中,以抵抗侧信道攻击。为了验证我们提出的逻辑,我们评估了各个安全绝热逻辑的电流轨迹和能量耗散。建议的CSSAL,安全绝热逻辑,对称绝热逻辑,2N-2N2P和常规的三相双轨预充电逻辑。此外,对乘积在GF(2 m sup>)上的逻辑电阻和能量效率进行了深入的研究和比较研究。根据获得的SPICE仿真结果,我们推断,所提出的典型逻辑抗差分功率分析的能力更强,并且对差分电磁分析攻击的鲁棒性更高,因为自从文献以来,它就消耗恒定的低功率和一致的低峰值电流。
展开▼