Recent advances and trends in lightweight cryptography for IoT security
NA Gunathilake, A Al-Dubai… - 2020 16th International …, 2020 - ieeexplore.ieee.org
Lightweight cryptography is a novel diversion from conventional cryptography to minimise its
high level of resource requirements, thus it would impeccably fit in the internet-of-things (IoT) …
high level of resource requirements, thus it would impeccably fit in the internet-of-things (IoT) …
Attacks on cryptosystems implemented via VLSI: A review
MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
EM and power SCA-resilient AES-256 through> 350× current-domain signature attenuation and local lower metal routing
Mathematically secure cryptographic algorithms, when implemented on a physical substrate,
leak critical “side-channel” information, leading to power and electromagnetic (EM) analysis …
leak critical “side-channel” information, leading to power and electromagnetic (EM) analysis …
Syn-STELLAR: An EM/power SCA-resilient AES-256 with synthesis-friendly signature attenuation
Mathematically secure cryptographic algorithms leak meaningful side-channel information in
the form of correlated power and electromagnetic (EM) signals, leading to physical side …
the form of correlated power and electromagnetic (EM) signals, leading to physical side …
Electromagnetic and power side-channel analysis: Advanced attacks and low-overhead generic countermeasures through white-box approach
Electromagnetic and power side-channel analysis (SCA) provides attackers a prominent tool
to extract the secret key from the cryptographic engine. In this article, we present our cross …
to extract the secret key from the cryptographic engine. In this article, we present our cross …
Dual-hiding side-channel-attack resistant FPGA-based asynchronous-logic AES: Design, countermeasures and evaluation
KS Chong, JS Ng, J Chen, NKZ Lwin… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
We present a side-channel-attack (SCA) resistant asynchronous-logic (async-logic)
Advanced Encryption Standard (AES) accelerator with dual-hiding SCA countermeasures, ie …
Advanced Encryption Standard (AES) accelerator with dual-hiding SCA countermeasures, ie …
Securing AES designs against power analysis attacks: a survey
TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
A time-/frequency-domain side-channel attack resistant AES-128 and RSA-4K crypto-processor in 14-nm CMOS
A side-channel attack (SCA) hardened AES-128 and RSA crypto-processor in 14-nm CMOS
with measured resistance to correlation power/electromagnetic analysis (CPA/CEMA) in …
with measured resistance to correlation power/electromagnetic analysis (CPA/CEMA) in …
EM/power side-channel attack: White-box modeling and signature attenuation countermeasures
This article presents analysis methods to pin-point the cause of sidechannel leakage in
integrated circuits and proposes a number of techniques for leakage attenuation.-Rosario …
integrated circuits and proposes a number of techniques for leakage attenuation.-Rosario …
Side-channel leakage in Suzuki stack circuits
Superconducting digital electronics, particularly, a single-flux quantum (SFQ) logic, is a
natural candidate for large-scale in-fridge control circuitry of superconducting quantum …
natural candidate for large-scale in-fridge control circuitry of superconducting quantum …