A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard

J Kaur, AC Canto, MM Kermani… - arxiv preprint arxiv …, 2023 - arxiv.org
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …

[HTML][HTML] Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

A lightweight masked AES implementation for securing IoT against CPA attacks

W Yu, S Köse - IEEE Transactions on Circuits and Systems I …, 2017 - ieeexplore.ieee.org
A false key-based advanced encryption standard (AES) technique is proposed to prevent
the stored secret key leaking from the substitution-box under correlation power analysis …

Far field EM side-channel attack on AES using deep learning

R Wang, H Wang, E Dubrova - Proceedings of the 4th ACM Workshop …, 2020 - dl.acm.org
We present the first deep learning-based side-channel attack on AES-128 using far field
electromagnetic emissions as a side channel. Our neural networks are trained on traces …

Space and time-efficient quantum multiplier in post quantum cryptography era

DSC Putranto, RW Wardhani, HT Larasati… - IEEE Access, 2023 - ieeexplore.ieee.org
This paper examines the asymptotic performance of multiplication and the cost of quantum
implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the …

Tandem deep learning side-channel attack on FPGA implementation of AES

H Wang, E Dubrova - SN Computer Science, 2021 - Springer
Side-channel attacks have become a realistic threat to implementations of cryptographic
algorithms, especially with the help of deep-learning techniques. The majority of recently …

EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT

P Singh, M Khari, S Vimal - Wireless Personal Communications, 2022 - Springer
Mobile ad hoc networks are attaining popularity to its highest currently, as the users need
wireless connectivity regardless of their geographical location. Threats of security attacks …

Hardware security assurance in emerging IoT applications

J Dofe, J Frey, Q Yu - 2016 IEEE International Symposium on …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) offers a more advanced service than a single device or an
isolated system, as IoT connects diverse components, such as sensors, actuators, and …

Side-channel analysis of chaos-based substitution box structures

MŞ Açikkapi, F Özkaynak, AB Özer - IEEE Access, 2019 - ieeexplore.ieee.org
There is a theoretically strong relationship between chaos and cryptology. In practice, one of
the most successful applications of this relationship is chaos-based s-box structures …

Error detection reliable architectures of Camellia block cipher applicable to different variants of its substitution boxes

MM Kermani, R Azarderakhsh… - 2016 IEEE Asian …, 2016 - ieeexplore.ieee.org
Different security properties are provided by cryptographic architectures to protect sensitive
usage models such as implantable and wearable medical devices and nano-sensor nodes …