An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications

V Bhagat, S Kumar, SK Gupta… - … Practice and Experience, 2023 - Wiley Online Library
Lightweight cryptography is a rapidly develo** research field. Its main goal is to provide
security for devices with fewer resources. These limited‐resource devices implement …

[PDF][PDF] Intel SGX explained

V Costan - IACR Cryptol, EPrint Arch, 2016 - people.cs.rutgers.edu
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …

Malware guard extension: Using SGX to conceal cache attacks

M Schwarz, S Weiser, D Gruss, C Maurice… - Detection of Intrusions …, 2017 - Springer
In modern computer systems, user processes are isolated from each other by the operating
system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor …

Flush+ Flush: a fast and stealthy cache attack

D Gruss, C Maurice, K Wagner, S Mangard - Detection of Intrusions and …, 2016 - Springer
Research on cache attacks has shown that CPU caches leak significant information.
Proposed detection mechanisms assume that all cache attacks cause more cache hits and …

{ARMageddon}: Cache attacks on mobile devices

M Lipp, D Gruss, R Spreitzer, C Maurice… - 25th USENIX Security …, 2016 - usenix.org
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention
among the scientific community and powerful techniques to exploit cache side channels …

Cache template attacks: Automating attacks on inclusive {Last-Level} caches

D Gruss, R Spreitzer, S Mangard - 24th USENIX Security Symposium …, 2015 - usenix.org
Recent work on cache attacks has shown that CPU caches represent a powerful source of
information leakage. However, existing attacks require manual identification of …

{ScatterCache}: thwarting cache attacks via cache set randomization

M Werner, T Unterluggauer, L Giner… - 28th USENIX Security …, 2019 - usenix.org
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …

[LIBRO][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

Batch fully homomorphic encryption over the integers

JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint… - Advances in Cryptology …, 2013 - Springer
We extend the fully homomorphic encryption scheme over the integers of van Dijk et
al.(DGHV) into a batch fully homomorphic encryption scheme, ie to a scheme that supports …