Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrated circuit
biblio
Skew-Tent Map Based CMOS Random Number Generator with Chaotic Sampling
Submitted by grigby1 on Thu, 06/30/2022 - 4:05pm
Immunity testing
switched-capacitor
skew-tent map
sampling methods
PL1D maps
discrete-time chaotic maps
chaotic sampling
Bit rate
random number generator
Semiconductor device modeling
chaotic cryptography
Cryptography
Power demand
Interference
integrated circuit
Metrics
NIST
Scalability
Resiliency
resilience
pubcrawl
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
integrated circuit
Tamarin prover
security protocols
Security Properties
Resiliency
resilience
pufs
PUF-based protocols
PUF API
pubcrawl
Protocols
physical unclonable functions
mutual authentication protocol
integrated circuits
Analytical models
hardware-based security
Hardware
formal methods and verification
fingerprint identification
error correction data
Data models
Cryptography
Cryptographic Protocols
Compositionality
application programming interface
APIs
API
biblio
S℡LAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-Cause Analysis
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
signature attenuation hardware
low-overhead solution
Metals
Metrics
noninvasive attacker
noninvasive electromagnetic side-channel attacks
power side-channel countermeasures
Probes
pubcrawl
resilience
Resiliency
resource-constrained Internet-connected devices
Routing
side-channel analysis attacks
signature attenuation embedded CRYPTO
low-level metal routing
size 32.0 nm
size 65.0 nm
S℡LAR
S℡LAR hardware
system-level EM simulations
system-level implementation
telecommunication network routing
top-level metal layers
TSMC 65 nm CMOS technology
two-stage solution
white-box analysis
white box cryptography
white-box understanding
external attacker
composability
critical encryption signature
critical signal radiation
Cryptographic Hardware
Cryptography
EM leakage
EM probes
EM SCA attack
EM Side-channel attack
encryption
entire cryptographic core
entire crypto IP
example cryptographic block
CMOS integrated circuits
frequency 40.0 MHz
Generic countermeasure
generic EM side-channel attack protection
Ground-up EM Leakage Modeling
ground-up root-cause analysis
higher-level metal layers
high-resolution electromagnetic probes
integrated circuit
Integrated circuit modeling
Intel 32 nm CMOS technology interconnect stack
internet
lower-level metal layers
lower-level metal routing
biblio
Security of hardware architecture, design and performance of low drop-out voltage regulator LDO to protect power mobile applications
Submitted by grigby1 on Wed, 02/21/2018 - 12:43pm
CMOS low-power
Hardware
integrated circuit
LDO
Low power SOC
Mathematical model
Network Security Architecture
Power transistors
pubcrawl
Regulators
resilience
Resiliency
security
Voltage control
wireless sensor networks
WSNs
biblio
Public Physical Unclonable Functions
Submitted by BrandonB on Thu, 04/30/2015 - 1:23pm
physical unclonable function (PUF)
trusted information flows
time gap
simulation possible
secret-key technology
second PPUF generation
representative PPUF architectures
public PUF (PPUF)
public PUF
public protocols
public physical unclonable functions
Public key
Protocols
process variation
private key cryptography
analog domain
one-time hardware pads
Logic gates
laborious systems
Integrated circuit modeling
integrated circuit
Hardware Security
Hardware
direct execution
digital PPUF
device aging
Cryptography
Cryptographic Protocols
crucial PUF limitation
biblio
Cryptographically secure shields
Submitted by BrandonB on Thu, 04/30/2015 - 1:20pm
metal layer
TSV technology
Through Silicon Vias (TSV)
through silicon vias
three-dimensional integrated circuits
SIMON lightweight block cipher
SIMON block cipher
shield structure
security product
Routing
Registers
protective layer
probing attacks
Metals
chip design
mesh lines
invasive attacks
integrated circuits
integrated circuit design
integrated circuit
Focused Ion Beam (FIB)
digital shield
digital fence
Cryptography
Cryptographically secure shield
cryptographical secure shield
Ciphers