More efficient private circuits II through threshold implementations

T De Cnudde, S Nikova - … on Fault Diagnosis and Tolerance in …, 2016 - ieeexplore.ieee.org
… is necessary to achieve confidentiality and integrity for both … itself in order to retrieve secret
keys with much more ease … to secure an AND gate using PC-I when non-ideal gates are …

Secrecy analysis of ambient backscatter NOMA systems under I/Q imbalance

X Li, M Zhao, Y Liu, L Li, Z Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… 3 demonstrates the impact of IP versus OP under ideal/non-ideal conditions with ςt = ςr = {1, …
systems has better secrecy performance, which drives the application in the IoT networks. …

Physical layer key generation from wireless channels with non-ideal channel reciprocity: A deep learning based approach

C Feng, L Sun - 2022 IEEE 95th Vehicular Technology …, 2022 - ieeexplore.ieee.org
… , one of them will be used to extract secret key by our proposed key quantization algorithm.
Below … the performance of benchmark schemes and our proposed one, and two performance

Deep learning for hardware-impaired wireless secret key generation with man-in-the-middle attacks

M Letafati, H Behroozi, BH Khalaj… - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
… The achievable secret key rate (SKR) and the impact of MiM on system’s performance
are analyzed. Our numerical results verify the performance gain of our proposed learningbased …

Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview

AJ Acosta, T Addabbo… - International Journal of …, 2017 - Wiley Online Library
… Cryptographic algorithms aim to convert secret data into an … to the hardware device itself,
producing higher performance … A non-ideal TRNG fails to satisfy at least one of the two given …

Impact of hardware impairments on the physical layer security of cell-free massive MIMO

A Tahreem - 2024 - knowledgecommons.lakeheadu.ca
hardware quality conditions including ideal and non-ideal. The assessment of system and
security performance … the substantial degradation of the secrecy performance of the MaMIMO …

Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments

V Shahiri, M Forouzesh, H Behroozi… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
… To boost the secrecy performance, an external jammer was relied upon, … non-ideal filters
inevitably degrade the system performance [22]–[24]. Naturally, the level of residual hardware

Hardware Security Features for Secure Embedded Devices

S Paulus, N Pohlmann, H Reimer… - ISSE 2006—Securing …, 2006 - Springer
… the chip layout and extracting static secrets from the chip. The … -circuit power due to non
ideal switching characteristics (Psc), … , where in order to optimize performance, the result of the …

Ultra-low power physical unclonable function with nonlinear fixed-resistance crossbar circuits

MR Mahmoodi, H Nili, Z Fahimi… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
… in addition to robust security performance. Here we present a … 3) provides a rich entropy
source for cryptographic secret key … Based on he very non-ideal conductance map. A factor of 4 …

Passive Beamforming For Practical RIS-Assisted Communication Systems With Non-Ideal Hardware

Y Liu, R Wang, Z Han - arXiv preprint arXiv:2401.07754, 2024 - arxiv.org
… Further, from the security perspective, the achievable secrecy rates have been … performance
degradation. Therefore, it is necessary to redesign the passive beamforming for a nonideal