A survey and perspective on artificial intelligence for security-aware electronic design automation
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …
used in several fields to improve performance and the level of automation. In recent years …
Challenges and opportunities of security-aware EDA
The foundation of every digital system is based on hardware in which security, as a core
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …
service of many applications, should be deeply embedded. Unfortunately, the knowledge of …
A novel design flow for a security-driven synthesis of side-channel hardened cryptographic modules
SA Huss, O Stein - Journal of Low Power Electronics and Applications, 2017 - mdpi.com
Over the last few decades, computer-aided engineering (CAE) tools have been developed
and improved in order to ensure a short time-to-market in the chip design business. Up to …
and improved in order to ensure a short time-to-market in the chip design business. Up to …
Amasive: an adaptable and modular autonomous side-channel vulnerability evaluation framework
Over the last decades computer aided engineering (CAE) tools have been developed and
improved in order to ensure a short time-to-market in the chip design business. Up to now …
improved in order to ensure a short time-to-market in the chip design business. Up to now …
Side-channel leakage assessment metrics and methodologies at design cycle: a case study for a cryptosystem
Current EDA (electronic design automation) tools are not capable to consider side-channel
vulnerabilities at design time. Therefore, designers should manage such security …
vulnerabilities at design time. Therefore, designers should manage such security …
CASCA: A design automation approach for designing hardware countermeasures against side-channel attacks
Implementing a cryptographic circuit poses challenges not always acknowledged in the
backing mathematical theory. One of them is the vulnerability against side-channel attacks …
backing mathematical theory. One of them is the vulnerability against side-channel attacks …
[PDF][PDF] A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Authors' addresses: David Selasi Koblah, dkoblah@ ul. edu; Rabin Yu Acharya, rabin.
acharya@ ul. edu; Daniel Capecci; Olivia P. Dizon-Paradis, Florida Institute for …
acharya@ ul. edu; Daniel Capecci; Olivia P. Dizon-Paradis, Florida Institute for …
Formal verification and automated masking of cryptographic hardware
D Knichel - 2023 - hss-opus.ub.ruhr-unibochum.de
RUB-Repository - Formal verification and automated masking of cryptographic hardware
Deutsch OPUS UB Bochum RUB » Bibliotheksportal Home Search Browse Publish FAQ …
Deutsch OPUS UB Bochum RUB » Bibliotheksportal Home Search Browse Publish FAQ …