[图书][B] Physically unclonable functions: Concept and constructions

R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …

Mutual information analysis: A generic side-channel distinguisher

B Gierlichs, L Batina, P Tuyls, B Preneel - International Workshop on …, 2008 - Springer
We propose a generic information-theoretic distinguisher for differential side-channel
analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et …

Sok: Design tools for side-channel-aware implementations

I Buhan, L Batina, Y Yarom, P Schaumont - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Side-channel attacks that leak sensitive information through a computing device's interaction
with its physical environment have proven to be a severe threat to devices' security …

FPGA and ASIC implementations of AES

K Gaj, P Chodowiec - Cryptographic engineering, 2009 - Springer
FPGA and ASIC Implementations of AES | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …

Effectiveness of leakage power analysis attacks on DPA-resistant logic styles under process variations

M Alioto, S Bongiovanni, M Djukanovic… - … on Circuits and …, 2013 - ieeexplore.ieee.org
This paper extends the analysis of the effectiveness of Leakage Power Analysis (LPA)
attacks to cryptographic VLSI circuits on which circuit level countermeasures against …

Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel

Z Liu, N Samwel, L Weissbart, Z Zhao, D Lauret… - arXiv preprint arXiv …, 2020 - arxiv.org
We introduce screen gleaning, a TEMPEST attack in which the screen of a mobile device is
read without a visual line of sight, revealing sensitive information displayed on the phone …

Em attack is non-invasive?-design methodology and validity verification of em attack sensor

N Homma, Y Hayashi, N Miura, D Fujimoto… - … and Embedded Systems …, 2014 - Springer
This paper presents a standard-cell-based semi-automatic design methodology of a new
conceptual countermeasure against electromagnetic (EM) analysis and fault-injection …

Static power side-channel analysis—An investigation of measurement factors

T Moos, A Moradi, B Richter - IEEE Transactions on Very Large …, 2019 - ieeexplore.ieee.org
The static power consumption of modern CMOS devices has become a substantial concern
in the context of the side-channel security of cryptographic hardware. Its continuous growth …

Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors

JL Danger, S Guilley, S Bhasin… - 2009 3rd International …, 2009 - ieeexplore.ieee.org
The security of cryptographic implementations relies not only on the algorithm quality but
also on the countermeasures to thwart attacks aiming at disclosing the secrecy. These …

A hardware-based countermeasure to reduce side-channel leakage: Design, implementation, and evaluation

A Gornik, A Moradi, J Oehm… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Side-channel attacks are one of the major concerns for security-enabled applications as
they make use of information leaked by the physical implementation of the underlying …