Table of Contents Author Guidelines Submit a Manuscript
International Journal of Reconfigurable Computing
Volume 2013, Article ID 517947, 12 pages
http://dx.doi.org/10.1155/2013/517947
Research Article

An Asynchronous FPGA Block with Its Tech-Mapping Algorithm Dedicated to Security Applications

Laboratoire TIMA, 46 Avenue Félix Viallet, 38031 Grenoble, France

Received 6 September 2012; Revised 26 November 2012; Accepted 9 December 2012

Academic Editor: Michael Hübner

Copyright © 2013 Taha Beyrouthy and Laurent Fesquet. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Wong, S. Vassiliadis, and S. Cotofana, “Futur directions of (Programmable and Reconfigurable) embedded processors,” in Proceedings of the Workshop on Systems, Architectures, Modeling and Simulation, Embedded Processor Design Challenges (SAMOS '02), 2002.
  2. P. Kocher, J. Jaffe, and B. Jun, “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,” in Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’96), vol. 1109 of Lecture Notes in Computer Science, pp. 104–113, Springer, Santa Barbara, Calif, USA, 1996.
  3. S. B. Örs, F. Gürkaynak, E. Oswald, and B. Preneel, “Power-analysis attack on an ASIC AES implementation,” in Proceedings of the International Conference on Information Technology: Coding Computing (ITCC '04), pp. 546–552, Washington, DC, USA, April 2004. View at Scopus
  4. P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '99), vol. 1666 of Lecture Notes in Computer Science, pp. 388–397, Springer, 1999.
  5. C. Rechberger and E. Oswald, “Practical Template Attacks,” in Proceedings of the 5th International Workshop on Information Security Applications (WISA '04), vol. 3325 of Lecture Notes in Computer Science, pp. 443–457, Springer, Jeju Island, Korea, August 2004.
  6. D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi, “The EM side-channel(s),” in Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '02), vol. 2523 of Lecture Notes in Computer Science, pp. 29–45, Springer, Redwood Shores, Calif, USA, 2002. View at Publisher · View at Google Scholar
  7. M. Ward, “EMV card payments—an update,” Information Security Technical Report, vol. 11, no. 2, pp. 89–92, 2006. View at Publisher · View at Google Scholar
  8. F. Bouesse, G. Sicard, and M. Renaudin, “Path swapping method to improve DPA resistance of QDI asynchronous circuits,” in Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '06), vol. 4249 of LNCS, pp. 384–398, Springer, Yokohama, Japan, October 2006.
  9. T. Wollinger and C. Paar, “How Secure are FPGAs in cryptographic applications?” in 13th International Conference on Field Programmable Logic and Applications (FPL '03), vol. 2778 of Lecture Notes in Computer Science, pp. 91–100, Lisbon, Portugal, September 2003. View at Publisher · View at Google Scholar
  10. A. J. Martin, A. Lines, R. Manohar et al., “The design of an asynchronous MIPS R3000 microprocessor,” in Proceedings of the 17th Conference on Advanced Research in VLSI (ARVLSI ’97), pp. 164–181, Ann Arbor, Mich, USA, September 1997. View at Publisher · View at Google Scholar
  11. A. J. Martin, M. Nystrom, K. Papadantonakis et al., “The Lutonium: a sub-nanojoule asynchronous 8051 microcontroller,” in Proceedings of the 9th International Symposium on Asynchronous Circuits and Systems (ASYNC '03), pp. 14–23, Vancouver, Canada, May 2003. View at Publisher · View at Google Scholar
  12. J. D. Garside, W. J. Bainbridge, A. Bardsley A et al., “AMULET3i—an asynchronous syste-on-chip,” in Proceedings of the 6th International Symposium on Advanced Research in Asynchronous Circuits and Systems (ASYNC '00), pp. 162–175, Eilat, Israel, April 2000. View at Publisher · View at Google Scholar
  13. R. Konishi, H. Ito, H. Nakada et al., “PCA-1: a fully asynchronous, self-reconfigurable LSI,” in Proceedings of the 7th International Symposium on Asynchronous Circuits and Systems (ASYNC '01), pp. 54–61, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. J. Teifel and R. Manohar, “An asynchronous dataflow FPGA architecture,” IEEE Transactions on Computers, vol. 53, no. 11, pp. 1376–1392, 2004. View at Publisher · View at Google Scholar · View at Scopus
  15. K. Maheswaran and V. Akella, “PGA-STC: programmable gate array for implementing self-timed circuits,” International Journal of Electronics, vol. 84, no. 3, pp. 255–267, 1998. View at Google Scholar · View at Scopus
  16. J. Teifel and R. Manohar, “Highly pipelined asynchronous FPGAs,” in Proceedings of the 12th ACM International Symposium on Field-Programmable Gate Arrays (FPGA '04), pp. 133–142, Monterey, Calif, USA, February 2004. View at Scopus
  17. S. Hauck, G. Boriello, and C. Ebeling, “Montage: an FPGA for synchronous and asynchronous circuits,” in Proceedings of the 2nd International Workshop on Field-Programmable Logic and Applications, Vienna, Ausrtia, August 1992.
  18. B. Gao, A globally asynchronous locally synchronous configurable array architecture for algorithlm embeddings [Ph.D. thesis], University of Edinburgh, 1996.
  19. R. Payne, Self timed field programmable gate array architectures [Ph.D. thesis], University of Edinburgh, 1997.
  20. http://www.achronix.com/.
  21. T. Beyrouthy, A. Razafindraibe, L. Fesquet et al., “A novel asynchronous e-FPGA architecture for security applications,” in Proceedings of the International Conference on Field Programmable Technology (ICFPT '07), pp. 369–372, Kokurakita, Japan, December 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Chaudhuri, S. Guilley, P. Hoogovost et al., “Physical Design of FPGA Interconnect to prevent Information Leakage,” in Proceedings of the 4th International Workshop on Reconfigurable Computing: Architectures, Tools and Applications (ARC '08), Lecture Notes in Computer Science, pp. 87–98, 2008.
  23. P. C. Kocher, J. Jaffe, and B. Jun, “Diferential power analysis,” in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '99), M. Wiener, Ed., vol. 1666 of Lecture Notes in Computer Science, pp. 388–397, Springer, Santa Barbara, Calif, USA, 1999.
  24. J. Quisquater and D. Samyde, “ElectroMagnetic Analysis (EMA): measures and counter-measures for smard cards,” in Proceedings of the International Conference on Research in Smart Cards (E-smart’01), vol. 2140 of Lecture Notes in Computer Science, pp. 200–210, 2001.
  25. R. J. Anderson and M. G. Kuhn:, “Low cost attacks on tamper resistant devices,” in Proceedings of the 5th International Workshop on Security Protocols, B. Christianson, B. Crispo, M. Lomas, and M. Roe, Eds., vol. 1361 of Lecture Notes in Computer Science, pp. 125–136, Springer, Paris, France, April 1997. View at Publisher · View at Google Scholar
  26. S. Moore, R. Anderson, P. Cunningham, R. Mullins, and G. Taylor, “Improving smart card security using self-timed circuits,” in Proceedings of the 8th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC '02), pp. 211–218, IEEE, 2002. View at Publisher · View at Google Scholar
  27. Y. Monnet, M. Renaudin, and R. Leveugle, “Designing resistant circuits against malicious faults injection using asynchronous logic,” IEEE Transactions on Computers, vol. 55, no. 9, pp. 1104–1115, 2006. View at Publisher · View at Google Scholar · View at Scopus
  28. L. Fesquet and M. Renaudin, “A programmable logic architecture for prototyping clockless circuits,” in Proceedings of the International Conference on Field Programmable Logic and Applications (FPL '05), pp. 293–298, Tampere, Finland, August 2005. View at Publisher · View at Google Scholar · View at Scopus
  29. N. Huot, H. Dubreuil, L. Fesquet, and M. Renaudin, “FPGA architecture for multi-style asynchronous logic,” in Proceedings of the Design, Automation and Test in Europe (DATE '05), pp. 32–35, Munich, Germany, March 2005. View at Publisher · View at Google Scholar · View at Scopus
  30. L. Fesquet, B. Folco, M. Steiner, and M. Renaudin:, “State-holding in look-up tables: aopplication to asynchronous logic,” in Proceedings of the IFIP International Conference on Very Large Scale Integration (VLSI-SoC '06), pp. 12–17, Nice, France, November 2006. View at Publisher · View at Google Scholar
  31. D. Solokov, J. Murphy, A. Bystrov, and A. Yakovlev, “Improving the Security of dual rail circuits,” in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, Mass, USA, August 2004.
  32. FIPS 46-3, “Data Encryption Standard (DES),” Specifies the Use of Triple DES, October 1999.
  33. C. Canovas and J. Clédière, “What do S-boxes say in fifferential side channel attacks?” Tech. Rep. 311, CEA-LETI, 2005. View at Google Scholar