A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

Provably secure higher-order masking of AES

M Rivain, E Prouff - … on Cryptographic Hardware and Embedded Systems, 2010 - Springer
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis
(SCA). To counteract it, masking schemes are usually involved which randomize key …

Introduction to differential power analysis

P Kocher, J Jaffe, B Jun, P Rohatgi - Journal of Cryptographic Engineering, 2011 - Springer
The power consumed by a circuit varies according to the activity of its individual transistors
and other components. As a result, measurements of the power used by actual computers or …

Masking against side-channel attacks: A formal security proof

E Prouff, M Rivain - Annual International Conference on the Theory and …, 2013 - Springer
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …

Exploring security vulnerabilities of unmanned aerial vehicles

NM Rodday, RO Schmidt, A Pras - NOMS 2016-2016 IEEE/IFIP …, 2016 - ieeexplore.ieee.org
We are currently observing a significant increase in the popularity of Unmanned Aerial
Vehicles (UAVs), popularly also known by their generic term drones. This is not only the …

A leakage-resilient mode of operation

K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …

Hardware security: Threat models and metrics

M Rostami, F Koushanfar… - 2013 IEEE/ACM …, 2013 - ieeexplore.ieee.org
The globalized semiconductor supply chain is vulnerable to hardware attacks including:
Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs) …

Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle

D Bellizia, O Bronchain, G Cassiers, V Grosso… - Advances in Cryptology …, 2020 - Springer
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …

Fresh re-keying: Security against side-channel and fault attacks for low-cost devices

M Medwed, FX Standaert, J Großschädl… - Progress in Cryptology …, 2010 - Springer
The market for RFID technology has grown rapidly over the past few years. Going along with
the proliferation of RFID technology is an increasing demand for secure and privacy …

Security through amnesia: a software-based solution to the cold boot attack on disk encryption

P Simmons - Proceedings of the 27th Annual Computer Security …, 2011 - dl.acm.org
Disk encryption has become an important security measure for a multitude of clients,
including governments, corporations, activists, security-conscious professionals, and privacy …