Attacks on cryptosystems implemented via VLSI: A review

MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …

Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges

J Knechtel - Proceedings of the 2020 International Symposium on …, 2020 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …

Security closure of physical layouts ICCAD special session paper

J Knechtel, J Gopinath, J Bhandari… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Computer-aided design (CAD) tools traditionally optimize for power, performance, and area
(PPA). However, given a vast number of hardware security threats, we call for secure-by …

A hybrid chaotic encryption ASIC with dynamic precision for internet of things

J Feng, J Wang, Y Zhu, K Han - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoT), device and data security has
attracted huge academic attention in recent years since conventional security methods are …

Towards secure composition of integrated circuits and electronic systems: On the role of EDA

J Knechtel, EB Kavun, F Regazzoni… - … , Automation & Test …, 2020 - ieeexplore.ieee.org
Modern electronic systems become evermore complex, yet remain modular, with integrated
circuits (ICs) acting as versatile hardware components at their heart. Electronic design …

Securing AES designs against power analysis attacks: a survey

TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …

Hardware security for and beyond CMOS technology

J Knechtel - Proceedings of the 2021 International Symposium on …, 2021 - dl.acm.org
As with most aspects of electronic systems and integrated circuits, hardware security has
traditionally evolved around the dominant CMOS technology. However, with the rise of …

Real-time detection of power analysis attacks by machine learning of power supply variations on-chip

D Utyamishev, I Partin-Vaisband - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Reliably and power efficiently securing integrated systems against advanced power analysis
attacks (PAAs) is a significant design challenge in modern integrated circuits. Power …

SC-DDPL: A novel standard-cell based approach for counteracting power analysis attacks in the presence of unbalanced routing

D Bellizia, S Bongiovanni, M Olivieri… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper we present the Standard Cell Delay-based Dual-rail Pre-charge Logic (SC-
DDPL), a novel logic style which is able to counteract Power Analysis Attacks (PAAs) also in …

Exploiting machine learning against on-chip power analysis attacks: Tradeoffs and design considerations

F Kenarangi, I Partin-Vaisband - IEEE Transactions on Circuits …, 2018 - ieeexplore.ieee.org
Modern power analysis attacks (PAAs) and existing countermeasures pose unique
challenges on the design of simultaneously secure, power efficient, and high-performance …