An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

Emerging security mechanisms for medical cyber physical systems

O Kocabas, T Soyata, MK Aktas - IEEE/ACM transactions on …, 2016 - ieeexplore.ieee.org
The following decade will witness a surge in remote health-monitoring systems that are
based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) …

Error detection architectures for hardware/software co-design approaches of number-theoretic transform

A Sarker, AC Canto, MM Kermani… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Number-theoretic transform (NTT) is an efficient polynomial multiplication technique of lattice-
based post-quantum cryptography including Kyber which is standardized as the NIST key …

ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks

T Schneider, A Moradi, T Güneysu - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
Side-channel analysis and fault-injection attacks are known as major threats to any
cryptographic implementation. Hardening cryptographic implementations with appropriate …

Impeccable circuits

A Aghaie, A Moradi, S Rasoolzadeh… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
By injecting faults, active physical attacks pose serious threats to cryptographic hardware
where Concurrent Error Detection (CED) schemes are promising countermeasures. They …

Security of cloud FPGAs: A survey

C Jin, V Gohil, R Karri, J Rajendran - arXiv preprint arXiv:2005.04867, 2020 - arxiv.org
Integrating Field Programmable Gate Arrays (FPGAs) with cloud computing instances is a
rapidly emerging trend on commercial cloud computing platforms such as Amazon Web …

Fault template attacks on block ciphers exploiting fault propagation

S Saha, A Bag, D Basu Roy, S Patranabis… - Advances in Cryptology …, 2020 - Springer
Fault attacks (FA) are one of the potent practical threats to modern cryptographic
implementations. Over the years the FA techniques have evolved, gradually moving towards …

Hardware constructions for error detection in lightweight welch-gong (WG)-oriented streamcipher WAGE benchmarked on FPGA

J Kaur, A Sarker, MM Kermani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Providing an acceptable level of security at low cost becomes a challenge in embedded
systems that have limited resources, eg, Internet of Things application devices. Lightweight …

Reliable hardware architectures for cryptographic block ciphers LED and HIGHT

S Subramanian, M Mozaffari-Kermani… - … on Computer-Aided …, 2017 - ieeexplore.ieee.org
Cryptographic architectures provide different security properties to sensitive usage models.
However, unless reliability of architectures is guaranteed, such security properties can be …