[PDF][PDF] Complementary dual codes for counter-measures to side-channel attacks.

C Carlet, S Guilley - Adv. Math. Commun., 2016 - researchgate.net
We recall why linear codes with complementary duals (LCD codes) play a role in counter-
measures to passive and active side-channel analyses on embedded cryptosystems. The …

Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses

XT Ngo, S Bhasin, JL Danger… - … on Hardware Oriented …, 2015 - ieeexplore.ieee.org
Hardware Trojan Horses (HTH) are a serious threat to semiconductor industry with
significant economic impact. We introduced in [10] a method called “encoded circuit”, which …

Introduction to hardware Trojan detection methods

J Francq, F Frick - 2015 Design, Automation & Test in Europe …, 2015 - ieeexplore.ieee.org
Hardware Trojans (HTs) are identified as an emerging threat for the integrity of Integrated
Circuits (ICs) and their applications. Attackers attempt to maliciously manipulate the …

Hardware Trojan detection by delay and electromagnetic measurements

XT Ngo, I Exurville, S Bhasin, JL Danger… - … , Automation & Test …, 2015 - ieeexplore.ieee.org
Hardware Trojans (HT) inserted in integrated circuits have received special attention of
researchers. In this paper, we present firstly a novel HT detection technique based on path …

Linear Complementary Dual codes and Linear Complementary Pairs of AG codes in function fields

AS Castellanos, AV Marques… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, linear complementary pairs (LCPs) of codes and linear complementary dual
(LCD) codes have gained significant attention due to their applications in coding theory and …

Cist: A threat modelling approach for hardware supply chain security

B Halak - Hardware Supply Chain Security: Threat Modelling …, 2021 - Springer
The relentless drive for more sophisticated and cheaper electronics products has led to
unprecedented level of outsourcing in the hardware supply chain. This has led to the …

Characterization and enumeration of complementary dual abelian codes

A Boripan, S Jitman, P Udomkavanich - Journal of Applied Mathematics …, 2018 - Springer
Abelian codes and complementary dual codes form important classes of linear codes that
have been extensively studied due to their rich algebraic structures and wide applications. In …

Hardware trojan detection through information flow security verification

MM Tehranipoor, A Nahiyan, DJ Forte - US Patent 11,270,002, 2022 - Google Patents
Disclosed are various embodiments for detecting hardware Trojans through information flow
security verification. A file comprising register transfer level (HDL) code for an intel lectual …

硬件木马研究动态综述

赵剑锋, 史岗 - 信息安全学报, 2017 - jcs.iie.ac.cn
由于集成电路的设计制造技术越来越复杂, 使得芯片在设计及生产过程中充满潜在的威胁,
即有可能被加入硬件木马. 硬件木马有可能改变系统功能, 泄漏重要信息, 毁坏系统或造成拒绝 …

Codes for side-channel attacks and protections

S Guilley, A Heuser, O Rioul - … , C2SI 2017, Rabat, Morocco, April 10–12 …, 2017 - Springer
This article revisits side-channel analysis from the standpoint of coding theory. On the one
hand, the attacker is shown to apply an optimal decoding algorithm in order to recover the …