[HTML][HTML] The recent trends in cyber security: A review

J Kaur, KR Ramkumar - Journal of King Saud University-Computer and …, 2022 - Elsevier
During recent years, many researchers and professionals have revealed the endangerment
of wireless communication technologies and systems from various cyberattacks, these …

A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues

BJ Mohd, T Hayajneh, AV Vasilakos - Journal of Network and Computer …, 2015 - Elsevier
This paper investigates the lightweight block ciphers׳ implementations, which have received
a fair amount of research for their essential security role in low-resource devices. Our …

Hal—the missing piece of the puzzle for hardware reverse engineering, trojan detection and insertion

M Fyrbiak, S Wallat, P Swierczynski… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad
of smart-X devices to military systems. In many attack scenarios an adversary merely has …

Recent attacks and defenses on FPGA-based systems

J Zhang, G Qu - ACM Transactions on Reconfigurable Technology and …, 2019 - dl.acm.org
Field-programmable gate array (FPGA) is a kind of programmable chip that is widely used in
many areas, including automotive electronics, medical devices, military and consumer …

Survey of hardware protection of design data for integrated circuits and intellectual properties

B Colombier, L Bossuet - IET Computers & Digital Techniques, 2014 - Wiley Online Library
This study reviews the current situation regarding design protection in the microelectronics
industry. Over the past 10 years, the designers of integrated circuits (IC) and intellectual …

The security of ARM TrustZone in a FPGA-based SoC

EM Benhani, L Bossuet, A Aubert - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cybersecurity of embedded systems has become a major challenge for the development of
the Internet of Things, of Cloud computing and other trendy applications without devoting a …

Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip

L Bossuet, M Grand, L Gaspar, V Fischer… - ACM Computing …, 2013 - dl.acm.org
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines;
they must be carefully considered without reducing the major role of classical design …

A closer look at security in random number generators design

V Fischer - Constructive Side-Channel Analysis and Secure …, 2012 - Springer
The issue of random number generation is crucial for the implementation of cryptographic
systems. Random numbers are often used in key generation processes, authentication …

Towards dynamic and partial reconfigurable hardware architectures for cryptographic algorithms on embedded devices

A Alkamil, DG Perera - IEEE Access, 2020 - ieeexplore.ieee.org
In the era of IoT, embedded systems are becoming the cornerstone of many IoT related
applications, such as smart cars and wearable devices. However, embedded devices have …

FPGA based generic RO TRNG architecture for image confusion

R Sivaraman, S Rajagopalan… - Multimedia Tools and …, 2020 - Springer
Abstract True Random Number Generator (TRNG) has become a central element of today's
secure communication. TRNGs developed through FPGA implementation have a significant …