Towards secure composition of integrated circuits and electronic systems: On the role of EDA

J Knechtel, EB Kavun, F Regazzoni… - … , Automation & Test …, 2020 - ieeexplore.ieee.org
Modern electronic systems become evermore complex, yet remain modular, with integrated
circuits (ICs) acting as versatile hardware components at their heart. Electronic design …

Friet: An Authenticated Encryption Scheme with Built-in Fault Detection

T Simon, L Batina, J Daemen, V Grosso… - … Conference on the …, 2020 - Springer
In this work we present a duplex-based authenticated encryption scheme Friet based on a
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …

A countermeasure against statistical ineffective fault analysis

J Breier, M Khairallah, X Hou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Current state-of-the-art countermeasures against Fault Injection Attacks (FIA) provide good
protection against analysis methods that require the differences in the correct and faulty …

Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection

B Rashidi - The Journal of Supercomputing, 2024 - Springer
In this paper, fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications
with multiple error detection and correction are presented. Here, we consider three …

EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip

M Hussain, A Malekpour, H Guo… - 2018 IEEE Computer …, 2018 - ieeexplore.ieee.org
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …

Design and evaluation of countermeasures against fault injection attacks and power side-channel leakage exploration for AES block cipher

FE Potestad-Ordonez, E Tena-Sánchez… - IEEE …, 2022 - ieeexplore.ieee.org
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main
methods for exploiting the vulnerabilities of physical implementations of block ciphers …

Securing cryptographic circuits by exploiting implementation diversity and partial reconfiguration on FPGAs

B Hettwer, J Petersen, S Gehrer… - … , Automation & Test …, 2019 - ieeexplore.ieee.org
Adaptive and reconfigurable systems such as Field Programmable Gate Arrays (FPGAs)
play an integral part of many complex embedded platforms. This implies the capability to …

LEDA: Locking Enabled Differential Analysis of Cryptographic Circuits

D Upadhyaya, M Gay, I Polian - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Hardware implementations of cryptographic primitives require protection against physical
attacks and supplychain threats at the same time. This raises the question of secure …

5G cellular: Survey on some challenging techniques

Y Benchaabene, N Boujnah… - 2017 18th International …, 2017 - ieeexplore.ieee.org
The evolving fifth generation (5G) cellular wireless networks are envisioned to provide
higher data rates, enhance end-user quality-of-experience (QoE), reduce end-to-end …

Instruction duplication: Leaky and not too fault-tolerant!

L Cojocar, K Papagiannopoulos, N Timmers - Smart Card Research and …, 2018 - Springer
Fault injection attacks alter the intended behavior of micro-controllers, compromising their
security. These attacks can be mitigated using software countermeasures. A widely-used …