Physical attack protection techniques for IC chip level hardware security

M Nagata, T Miki, N Miura - IEEE transactions on very large …, 2021 - ieeexplore.ieee.org
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …

Enabling PIM-based AES encryption for online video streaming

Y Liu, L Wang, A Qouneh, X Fu - Journal of Systems Architecture, 2022 - Elsevier
Encryption of streaming video is becoming critical to the success of commercial enterprise
and to consumers alike. To meet copyright and privacy requirements, encrypting video data …

Randomness generation for secure hardware masking-unrolled trivium to the rescue

G Cassiers, L Masure, C Momin, T Moos… - Cryptology ePrint …, 2023 - eprint.iacr.org
Masking is a prominent strategy to protect cryptographic implementations against side-
channel analysis. Its popularity arises from the exponential security gains that can be …

Securing NFV/SDN IoT using Vnfs over a compute-intensive hardware resource in NFVI

WL Chin, HA Ko, NW Chen, PW Chen, T Jiang - IEEE Network, 2023 - ieeexplore.ieee.org
The Network Function Virtualization (NFV) and Software-Defined Networking (SDN) are
network paradigms for flexibly deploying future networks while guaranteeing security service …

The cost to break SIKE: A comparative hardware-based analysis with AES and SHA-3

P Longa, W Wang, J Szefer - … in Cryptology–CRYPTO 2021: 41st Annual …, 2021 - Springer
This work presents a detailed study of the classical security of the post-quantum
supersingular isogeny key encapsulation (SIKE) protocol using a realistic budget-based cost …

Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON‐Galois/Counter Mode

X Cheng, Y Xu, K Wang, Y Zhang, B Li… - International Journal of …, 2023 - Wiley Online Library
This brief proposes a new lightweight authenticated encryption algorithm SIMON‐GCM for
Internet of Things (IoT) security, which realizes the combination of SIMON block cipher and …

A low-cost and highly compact FPGA-based encryption/decryption architecture for AES algorithm

C Equihua, E Anides, JL García… - IEEE Latin America …, 2021 - ieeexplore.ieee.org
Nowadays, the design of ultra-compact area advanced encryption standard (AES)
architectures is highly demanded by the electronics industry since many of these …

FeCrypto: instruction set architecture for cryptographic algorithms based on FeFET-based in-memory computing

R Liu, X Zhang, Z Xie, X Wang, Z Li… - … on Computer-Aided …, 2023 - ieeexplore.ieee.org
Recently, computing-in-memory (CiM) becomes a promising technology for alleviating the
memory wall bottleneck. CiM is suitable for data-intensive applications, especially …

IMCRYPTO: an in-memory computing fabric for AES encryption and decryption

D Reis, H Geng, M Niemier… - IEEE Transactions on Very …, 2022 - ieeexplore.ieee.org
This article proposes IMCRYPTO, an in-memory computing (IMC) fabric for accelerating
advanced encryption standard (AES) encryption and decryption. IMCRYPTO employs a …

Generation and evaluation of a new time-dependent dynamic S-box algorithm for AES block cipher cryptosystems

HT Assafli, IA Hashim - IOP Conference Series: Materials …, 2020 - iopscience.iop.org
Cryptographic communication systems depend extensively on the Advanced Encryption
Standard (AES) block cipher algorithm. The encryption strength in the AES algorithm is …