Sok: Deep learning-based physical side-channel analysis
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …
devices for already almost three decades. A variety of attacks and targets they can be …
Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …
hardware-oriented security and trust. However, implementing hardware security primitives …
Physical attack protection techniques for IC chip level hardware security
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …
chips in a practical utilization environment. This article provides overviews of physical …
Enhanced power and electromagnetic SCA resistance of encryption engines via a security-aware integrated all-digital LDO
A Singh, M Kar, VCK Chekuri… - IEEE Journal of Solid …, 2019 - ieeexplore.ieee.org
This article demonstrates enhanced power (P) and electromagnetic (EM) side-channel
analysis (SCA) attack resistance of standard (unprotected) 128-bit advanced encryption …
analysis (SCA) attack resistance of standard (unprotected) 128-bit advanced encryption …
27.3 EM and power SCA-resilient AES-256 in 65nm cmos through> 350× current-domain signature attenuation
Computationally-secure cryptographic algorithms when implemented on physical platforms
leak critical physical signals correlated with the secret key in the form of power consumption …
leak critical physical signals correlated with the secret key in the form of power consumption …
Syn-STELLAR: An EM/power SCA-resilient AES-256 with synthesis-friendly signature attenuation
Mathematically secure cryptographic algorithms leak meaningful side-channel information in
the form of correlated power and electromagnetic (EM) signals, leading to physical side …
the form of correlated power and electromagnetic (EM) signals, leading to physical side …
S2ADC: A 12-bit, 1.25-MS/s secure SAR ADC with power side-channel attack resistance
T Jeong, AP Chandrakasan… - IEEE Journal of Solid …, 2020 - ieeexplore.ieee.org
When an ADC is converting a confidential analog signal into digital codes, it may expose a
critical hardware security loophole. By exploiting the strong correlation between the ADC …
critical hardware security loophole. By exploiting the strong correlation between the ADC …
36.2 An EM/power SCA-resilient AES-256 with synthesizable signature attenuation using digital-friendly current source and RO-bleed-based integrated local feedback …
Mathematically secure cryptographic algorithms leak side-channel information in the form of
correlated power and electromagnetic (EM) signals, leading to physical sidechannel …
correlated power and electromagnetic (EM) signals, leading to physical sidechannel …
Securing AES designs against power analysis attacks: a survey
TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
25.3 A 65nm edge-chasing quantizer-based digital LDO featuring 4.58 ps-FoM and side-channel-attack resistance
Low-Dropout Regulators (LDOs) are commonly desired for fine-grained power management
in SoCs because of their compact area, high current efficiency, and small output ripple …
in SoCs because of their compact area, high current efficiency, and small output ripple …