A secure camouflaged threshold voltage defined logic family

B Erbagci, C Erbagci, NEC Akkaya… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
A myriad of security vulnerabilites can be exposed via the reverse engineering of the
integrated circuits contained in electronics systems. The goal of IC reverse engineering is to …

Charge balancing symmetric pre‐resolve adiabatic logic against power analysis attacks

P Ashok… - IET Information …, 2019 - Wiley Online Library
A novel, energy efficient and power analysis robust logic style called the charge balancing
symmetric pre‐resolve adiabatic logic (CBSPAL) is proposed to overcome the susceptibility …

Security-aware task mapping reducing thermal side channel leakage in CMPs

S Guo, J Wang, Z Chen, Z Lu, J Guo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Chip multiprocessor (CMP) suffers from growing threats on hardware security in recent
years, such as side channel attack, hardware Trojan infection, chip clone, etc. In this paper …

A new method for resisting collision attack based on parallel random delay S-box

F Zhou, N Wu, X Zhang, J Zhang - IEICE Electronics Express, 2019 - jstage.jst.go.jp
Collision Attack (CA) has posed a huge threat to the security of AES circuit. To protect
sensitive information, it's necessary to do research on defense strategy of CA. This letter …

The Unified Side-Channel Attack Testing Methodology (USCA-TM) with Hardware Microbenchmark Validation

A Johnson - 2023 - search.proquest.com
A side-channel in computing terms is a by-product of the implementation and functioning of
a computer systems' component part. Whether it be electromagnetic (EM) emissions, heat …

DPA resistance analysis of the cryptographic S-box implementation in static CMOS and TDPL logic style

CS Kumar, A Prathiba… - … Conference on Nextgen …, 2017 - ieeexplore.ieee.org
Cryptography is the art of realizing security by the strength of mathematics involved in the
security algorithm, the security is compromised by the mathematics of cryptanalysis using …

Circuit-Variant Moving Target Defense for Side-Channel Attacks on Reconfigurable Hardware

TH Mullins - 2022 - search.proquest.com
With the emergence of side-channel analysis (SCA) attacks, bits of a secret key may be
derived by correlating key values with physical properties of cryptographic process …

Design of power balance SRAM for DPA-resistance

K Zhou, P Wang, L Wen - Journal of Semiconductors, 2016 - iopscience.iop.org
A power balance static random-access memory (SRAM) for resistance to differential power
analysis (DPA) is proposed. In the proposed design, the switch power consumption and …

TVD‐PB logic circuit based on camouflaging circuit for IoT security

Y Zhang, Q Wu, P Wang, L Wen… - IET Circuits, Devices & …, 2022 - Wiley Online Library
Abstract Internet of Things (IoT) devices are vulnerable to many physical attacks, including
reverse engineering and side‐channel analysis because the sensitive information of circuits …

Asynchronous Circuits and Their Applications in Hardware Security

EY Tawfik, W Khalil - Emerging Topics in Hardware Security, 2021 - Springer
Asynchronous circuits are increasingly used as an efficient countermeasure for a wide range
of threats in the microelectronics industry. This chapter provides a tutorial on the basic …