R Beaulieu, D Shors, J Smith… - Cryptology ePrint …, 2015 - eprint.iacr.org
Abstract The US National Security Agency (NSA) developed the SIMON and SPECK families of lightweight block ciphers as an aid for securing applications in very constrained …
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided. Such covert channels establish a communication link between …
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous …
A Singh, N Chawla, JH Ko, M Kar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Design of ultralightweight but secure encryption engine is a key challenge for Internet-of- Things edge devices. This paper explores the system level design space for an ultralow …
K Shahbazi, SB Ko - IET Computers & Digital Techniques, 2020 - Wiley Online Library
This study presents a high throughput field‐programmable gate array (FPGA) implementation of advanced encryption standard‐128 (AES‐128). AES is a well‐known …
JM Cioranesco, JL Danger, T Graba… - … Security and Trust …, 2014 - ieeexplore.ieee.org
Probing attacks are serious threats on integrated circuits. Security products often include a protective layer called shield that acts like a digital fence. In this article, we demonstrate a …
Abstract Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …
A Shahverdi, M Taha… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
As networking has become major innovation driver for the Internet of Things as well as Networks on Chips, the need for effective cryptography in hardware is on a steep rise. Both …
This paper describes biometric-based cryptographic techniques for providing confidential communications and strong, mutual and multifactor authentication on the Internet of Things …