378 Communication Architectures for SoC
• Changes in the program flow, although they are usually easy to detect
by visual inspection of the power traces.
• Key-independent memory addresses.
• Parallel activity to increase the noise.
Some of the most used techniques between the algorithm-level masking
techniques include:
• Masking table look-ups, in order to implement masking in a simple and
efficient way. However, table initialization needs to be done for all the
masks involved in the operations, and the computational effort and mem-
ory requirements are high.
• Random precharging to perform implicit masking. If the device leaks
the Hamming distance, loading or storing a random value before the
actual intermediate value occurs, works as if the intermediate ...