Does logic locking work with {EDA} tools?

Z Han, M Yasin, JJV Rajendran - 30th USENIX Security Symposium …, 2021 - usenix.org
Logic locking is a promising solution against emerging hardware security threats, which
entails protecting a Boolean circuit using a “keying” mechanism. The latest and hitherto …

A touch of evil: High-assurance cryptographic hardware from untrusted components

V Mavroudis, A Cerulli, P Svenda, D Cvrcek… - Proceedings of the …, 2017 - dl.acm.org
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly
defined, designed and fabricated in different premises across the world. This reduces …

Security implications of intentional capacitive crosstalk

C Kison, OM Awad, M Fyrbiak… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With advances in shrinking process technology sizes, the parasitic effects of closely routed
adjacent wires, crosstalk, still present problems in practice since they directly influence …

Private circuits III: hardware trojan-resilience via testing amplification

S Dziembowski, S Faust, FX Standaert - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Security against hardware trojans is currently becoming an essential ingredient to ensure
trust in information systems. A variety of solutions have been introduced to reach this goal …

Steel: composable hardware-based stateful and randomised functional encryption

P Bhatotia, M Kohlweiss, L Martinico… - … Conference on Public …, 2021 - Springer
Trusted execution environments (TEEs) enable secure execution of programs on untrusted
hosts and cryptographically attest the correctness of outputs. As these are complex systems …

SoK: A stratified approach to blockchain decentralization

C Ovezik, D Karakostas, A Kiayias - International Conference on Financial …, 2024 - Springer
Decentralization has been touted as the principal security advantage which propelled
blockchain systems at the forefront of developments in the financial technology space. Its …

Efficiently testable circuits without conductivity

MA Baig, S Chakraborty, S Dziembowski… - Theory of Cryptography …, 2023 - Springer
The notion of “efficiently testable circuits”(ETC) was recently put forward by Baig et
al.(ITCS'23). Informally, an ETC compiler takes as input any Boolean circuit C and outputs a …

Secure outsourcing of cryptographic circuits manufacturing

G Ateniese, A Kiayias, B Magri, Y Tselekounis… - Provable Security: 12th …, 2018 - Springer
The fabrication process of integrated circuits (ICs) is complex and requires the use of off-
shore foundries to lower the costs and to have access to leading-edge manufacturing …

Leakage resilient l-more extractable hash and applications to non-malleable cryptography

A Kiayias, FH Liu, Y Tselekounis - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Abstract $\ell $-more extractable hash functions were introduced by Kiayias et al.(CCS'16)
as a strengthening of extractable hash functions by Goldwasser et al.(Eprint'11) and …

(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates

A Kiayias, FH Liu, Y Tselekounis - Journal of Cryptology, 2024 - Springer
Non-malleable codes were introduced by Dziembowski et al.(in: Yao (ed) ICS2010,
Tsinghua University Press, 2010), and its main application is the protection of cryptographic …