Design of Circuits and Packaging Systems for Security Chips

被引:1
作者
Nagata, Makoto [1 ]
机构
[1] Kobe Univ, Grad Sch Sci Technol & Innovat, Kobe 6578501, Japan
关键词
hardware security; secure packaging; cryptography; implementation attacks; side channel leakage; CMOS integrated circuits; BACKSIDE;
D O I
10.1587/transele.2022CDI0001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Hardware oriented security and trust of semiconductor integrated circuit (IC) chips have been highly demanded. This paper outlines the requirements and recent developments in circuits and packaging systems of IC chips for security applications, with the particular emphasis on protections against physical implementation attacks. Power side channels are of undesired presence to crypto circuits once a crypto algorithm is implemented in Silicon, over power delivery networks (PDNs) on the frontside of a chip or even through the backside of a Si substrate, in the form of power voltage variation and electromagnetic wave emanation. Preventive measures have been exploited with circuit design and packaging technologies, and partly demonstrated with Si test vehicles.
引用
收藏
页码:345 / 351
页数:7
相关论文
共 32 条
  • [1] A Thick Cu Layer Buried in Si Interposer Backside for Global Power Routing
    Araga, Yuuki
    Nagata, Makoto
    Ikeda, Hiroaki
    Miki, Takuji
    Miura, Noriyuki
    Watanabe, Naoya
    Shimamoto, Haruo
    Kikuchi, Katsuya
    [J]. IEEE TRANSACTIONS ON COMPONENTS PACKAGING AND MANUFACTURING TECHNOLOGY, 2019, 9 (03): : 502 - 510
  • [2] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
  • [3] A Novel Structure for Backside Protection Against Physical Attacks on Secure Chips or SiP
    Borel, S.
    Duperrex, L.
    Deschaseaux, E.
    Charbonnier, J.
    Clediere, J.
    Wacquez, R.
    Fournier, J.
    Souriau, J. -C.
    Simon, G.
    Merle, A.
    [J]. 2018 IEEE 68TH ELECTRONIC COMPONENTS AND TECHNOLOGY CONFERENCE (ECTC 2018), 2018, : 515 - 520
  • [4] Chang C.H., 2020, Frontiers in Hardware Security and Trust
  • [5] Theory, Design and Practice
  • [6] eps.ieee, Heterogeneous Integration Roadmap
  • [7] Fujimoto D, 2014, 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P32, DOI 10.1109/HST.2014.6855564
  • [8] A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
    Hammi, Badis
    Fayad, Achraf
    Khatoun, Rida
    Zeadally, Sherali
    Begriche, Youcef
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3440 - 3450
  • [9] Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks
    Homma, Naofumi
    Hayashi, Yu-ichi
    Aoki, Takafumi
    Miura, Noriyuki
    Fujimoto, Daisuke
    Nagata, Makoto
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (02) : 373 - 391
  • [10] Hardware Designer's Guide to Fault Attacks
    Karaklajic, Dusko
    Schmidt, Joern-Marc
    Verbauwhede, Ingrid
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2013, 21 (12) : 2295 - 2306