An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications
Lightweight cryptography is a rapidly develo** research field. Its main goal is to provide
security for devices with fewer resources. These limited‐resource devices implement …
security for devices with fewer resources. These limited‐resource devices implement …
[PDF][PDF] Intel SGX explained
V Costan - IACR Cryptol, EPrint Arch, 2016 - people.cs.rutgers.edu
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
Malware guard extension: Using SGX to conceal cache attacks
In modern computer systems, user processes are isolated from each other by the operating
system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor …
system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor …
Flush+ Flush: a fast and stealthy cache attack
Research on cache attacks has shown that CPU caches leak significant information.
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …
{ARMageddon}: Cache attacks on mobile devices
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention
among the scientific community and powerful techniques to exploit cache side channels …
among the scientific community and powerful techniques to exploit cache side channels …
Cache template attacks: Automating attacks on inclusive {Last-Level} caches
Recent work on cache attacks has shown that CPU caches represent a powerful source of
information leakage. However, existing attacks require manual identification of …
information leakage. However, existing attacks require manual identification of …
{ScatterCache}: thwarting cache attacks via cache set randomization
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …
even in the absence of software bugs. Currently, there are no practical and generic …
[LIBRO][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Batch fully homomorphic encryption over the integers
We extend the fully homomorphic encryption scheme over the integers of van Dijk et
al.(DGHV) into a batch fully homomorphic encryption scheme, ie to a scheme that supports …
al.(DGHV) into a batch fully homomorphic encryption scheme, ie to a scheme that supports …