Hardware/Software Cooperative Design Against Power Side-Channel Attacks on IoT Devices

M Yang, T Ahmed, S Inagaki… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
With the growth of Internet of Things (IoT) era, the protection of secret information on IoT
devices is becoming increasingly important. For IoT devices, attacks that target information …

Bake it till you make it: Heat-induced power leakage from masked neural networks

DM Mehta, M Hashemi, DS Koblah… - IACR Transactions …, 2024 - ojs.ub.ruhr-uni-bochum.de
Masking has become one of the most effective approaches for securing hardware designs
against side-channel attacks. Regardless of the effort put into correctly implementing …

Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency

B Gigerl, F Klug, S Mangard, F Mendel… - IACR Transactions on …, 2024 - icscm.ub.rub.de
Cryptographic devices in hostile environments can be vulnerable to physical attacks such as
power analysis. Masking is a popular countermeasure against such attacks, which works by …

A Low-Latency High-Order Arithmetic to Boolean Masking Conversion

J Liu, C Zhao, S Peng, B Yang, H Zhao… - IACR Transactions on …, 2024 - tches.iacr.org
Masking, an effective countermeasure against side-channel attacks, is commonly applied in
modern cryptographic implementations. Considering cryptographic algorithms that utilize …

Analyzing modulonet against transition effects

M Schmid, EB Kavun - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
While becoming an indispensable part of our lives, artificial intelligence comes also with
some problems. For instance, the theft of trained Machine Learning (ML) models through …

Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation

M Iavich, T Kuchukhidze - Cryptography, 2024 - mdpi.com
Significant advancements have been achieved in the field of quantum computing in recent
years. If somebody ever creates a sufficiently strong quantum computer, many of the public …

A Masked Hardware Accelerator for Feed-Forward Neural Networks With Fixed-Point Arithmetic

M Brosch, M Probst, M Glaser… - IEEE Transactions on Very …, 2023 - ieeexplore.ieee.org
Neural network (NN) execution on resource-constrained edge devices is increasing.
Commonly, hardware accelerators are introduced in small devices to support the execution …

Side-channel analysis of integrate-and-fire neurons within spiking neural networks

M Probst, M Brosch, G Sigl - … on Circuits and Systems I: Regular …, 2024 - ieeexplore.ieee.org
Spiking neural networks gain increasing attention in constraint edge devices due to event-
based low-power operation and little resource usage. Such edge devices often allow …

Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice

B Gigerl, F Mendel, M Schläffer, R Primas - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In this paper, we present efficient protected software implementations of the authenticated
cipher Ascon, the recently announced winner of the NIST standardization process for …

[PDF][PDF] A Power Side-channel Secure Embedded Processor for Lightweight IoT Applications

M Yang, M Yang - (No Title), 2024 - t2r2.star.titech.ac.jp
The development of the Internet of Things (IoT) has brought about a transformative shift in
daily life, creating a ubiquitous network of interconnected devices with profound impacts …