Conventional and machine learning approaches as countermeasures against hardware trojan attacks
Every year, the rate at which technology is applied on areas of our everyday life is
increasing at a steady pace. This rapid development drives the technology companies to …
increasing at a steady pace. This rapid development drives the technology companies to …
[HTML][HTML] FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
K Lata, LR Cenkeramaddi - Cryptography, 2023 - mdpi.com
Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic
platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic …
platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic …
Secure scan and test using obfuscation throughout supply chain
Scan-based test is commonly used to increase testability and fault coverage, however, it is
also known to be a liability for chip security. Research has shown that intellectual property …
also known to be a liability for chip security. Research has shown that intellectual property …
Physical attack protection techniques for IC chip level hardware security
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …
chips in a practical utilization environment. This article provides overviews of physical …
Hardware Root of Trust for SSN-basedDFT Ecosystems
A hardware root of trust (RoT) is the foundation on which all secure operations of a circuit
depend, including those related to DFT. Despite many countermeasures aimed at facing …
depend, including those related to DFT. Despite many countermeasures aimed at facing …
Security & trusted devices in the context of internet of things (IoT)
N Sklavos, ID Zaharakis, A Kameas… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
This work targets to the technologies of the Internet of Things (IoT), regarding to security and
trusted devices. It provides to the readers a comprehensive understanding of both security …
trusted devices. It provides to the readers a comprehensive understanding of both security …
A lightweight true random number generator for root of trust applications
There are many schemes proposed to protect integrated circuits (ICs) against an
unauthorized access and usage, or at least to mitigate security risks. They lay foundations …
unauthorized access and usage, or at least to mitigate security risks. They lay foundations …
H2B: Crypto Hash Functions Based on Hybrid Ring Generators
Protection of integrated circuits (ICs) against hardware security threats has been tackled by
many schemes proposed to mitigate risks associated with an unauthorized access and …
many schemes proposed to mitigate risks associated with an unauthorized access and …
[PDF][PDF] An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes.
The significant effort in the research and design of large-scale quantum computers has
spurred a transition to post-quantum cryptographic primitives worldwide. The post-quantum …
spurred a transition to post-quantum cryptographic primitives worldwide. The post-quantum …
SI ECCS: SECure context saving for IoT devices
E Valea, M Da Silva, G Di Natale… - … on design & …, 2018 - ieeexplore.ieee.org
Energy consumption of IoT devices is a very important issue. For this reason, many
techniques have been developed to allow IoT nodes to be aware of the amount of available …
techniques have been developed to allow IoT nodes to be aware of the amount of available …