Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …
hardware-oriented security and trust. However, implementing hardware security primitives …
STELLAR: A generic EM side-channel attack protection through ground-up root-cause analysis
The threat of side-channels is becoming increasingly prominent for resource-constrained
internet-connected devices. While numerous power side-channel countermeasures have …
internet-connected devices. While numerous power side-channel countermeasures have …
Improved power/EM side-channel attack resistance of 128-bit AES engines with random fast voltage dithering
This paper demonstrates the improved power and electromagnetic (EM) side-channel attack
(SCA) resistance of 128-bit Advanced Encryption Standard (AES) engines in 130-nm CMOS …
(SCA) resistance of 128-bit Advanced Encryption Standard (AES) engines in 130-nm CMOS …
ASNI: Attenuated signature noise injection for low-overhead power side-channel attack immunity
Computationally-secure cryptographic algorithms implemented on a physical platform leak
significant “side-channel” information through their power supplies. Correlational power …
significant “side-channel” information through their power supplies. Correlational power …
Physical attack protection techniques for IC chip level hardware security
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …
chips in a practical utilization environment. This article provides overviews of physical …
Enhanced power and electromagnetic SCA resistance of encryption engines via a security-aware integrated all-digital LDO
A Singh, M Kar, VCK Chekuri… - IEEE Journal of Solid …, 2019 - ieeexplore.ieee.org
This article demonstrates enhanced power (P) and electromagnetic (EM) side-channel
analysis (SCA) attack resistance of standard (unprotected) 128-bit advanced encryption …
analysis (SCA) attack resistance of standard (unprotected) 128-bit advanced encryption …
27.3 EM and power SCA-resilient AES-256 in 65nm cmos through> 350× current-domain signature attenuation
Computationally-secure cryptographic algorithms when implemented on physical platforms
leak critical physical signals correlated with the secret key in the form of power consumption …
leak critical physical signals correlated with the secret key in the form of power consumption …
Reducing power side-channel information leakage of AES engines using fully integrated inductive voltage regulator
This paper demonstrates an integrated inductive voltage regulator (IVR) for improving power
side-channel-attack (PSCA) resistance of 128-bit Advanced Encryption Standard (AES-128) …
side-channel-attack (PSCA) resistance of 128-bit Advanced Encryption Standard (AES-128) …
Abacus: Precise side-channel analysis
Side-channel attacks allow adversaries to infer sensitive information from non-functional
characteristics. Prior side-channel detection work is able to identify numerous potential …
characteristics. Prior side-channel detection work is able to identify numerous potential …
S2ADC: A 12-bit, 1.25-MS/s secure SAR ADC with power side-channel attack resistance
T Jeong, AP Chandrakasan… - IEEE Journal of Solid …, 2020 - ieeexplore.ieee.org
When an ADC is converting a confidential analog signal into digital codes, it may expose a
critical hardware security loophole. By exploiting the strong correlation between the ADC …
critical hardware security loophole. By exploiting the strong correlation between the ADC …