Bioelectronic sensor nodes for the internet of bodies
Energy-efficient sensing with physically secure communication for biosensors on, around,
and within the human body is a major area of research for the development of low-cost …
and within the human body is a major area of research for the development of low-cost …
Context-aware intelligence in resource-constrained IoT nodes: Opportunities and challenges
Editor's note: This article provides an academic perspective of the problem, starting with a
survey of recent advances in intelligent sensing, computation, communication, and energy …
survey of recent advances in intelligent sensing, computation, communication, and energy …
Concealable physically unclonable function chip with a memristor array
A physically unclonable function (PUF) is a creditable and lightweight solution to the mistrust
in billions of Internet of Things devices. Because of this remarkable importance, PUF need to …
in billions of Internet of Things devices. Because of this remarkable importance, PUF need to …
X-DeepSCA: Cross-device deep learning side channel attack
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel
Attack (X-DeepSCA), achieving an accuracy of> 99.9%, even in presence of significantly …
Attack (X-DeepSCA), achieving an accuracy of> 99.9%, even in presence of significantly …
STELLAR: A generic EM side-channel attack protection through ground-up root-cause analysis
The threat of side-channels is becoming increasingly prominent for resource-constrained
internet-connected devices. While numerous power side-channel countermeasures have …
internet-connected devices. While numerous power side-channel countermeasures have …
EM and power SCA-resilient AES-256 through> 350× current-domain signature attenuation and local lower metal routing
Mathematically secure cryptographic algorithms, when implemented on a physical substrate,
leak critical “side-channel” information, leading to power and electromagnetic (EM) analysis …
leak critical “side-channel” information, leading to power and electromagnetic (EM) analysis …
Improved power/EM side-channel attack resistance of 128-bit AES engines with random fast voltage dithering
This paper demonstrates the improved power and electromagnetic (EM) side-channel attack
(SCA) resistance of 128-bit Advanced Encryption Standard (AES) engines in 130-nm CMOS …
(SCA) resistance of 128-bit Advanced Encryption Standard (AES) engines in 130-nm CMOS …
A review and comparison of AI-enhanced side channel analysis
Side Channel Analysis (SCA) presents a clear threat to privacy and security in modern
computing systems. The vast majority of communications are secured through cryptographic …
computing systems. The vast majority of communications are secured through cryptographic …
27.3 EM and power SCA-resilient AES-256 in 65nm cmos through> 350× current-domain signature attenuation
Computationally-secure cryptographic algorithms when implemented on physical platforms
leak critical physical signals correlated with the secret key in the form of power consumption …
leak critical physical signals correlated with the secret key in the form of power consumption …
Enhanced power and electromagnetic SCA resistance of encryption engines via a security-aware integrated all-digital LDO
This article demonstrates enhanced power (P) and electromagnetic (EM) side-channel
analysis (SCA) attack resistance of standard (unprotected) 128-bit advanced encryption …
analysis (SCA) attack resistance of standard (unprotected) 128-bit advanced encryption …