Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Hardware
biblio
S℡LAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-Cause Analysis
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
signature attenuation hardware
low-overhead solution
Metals
Metrics
noninvasive attacker
noninvasive electromagnetic side-channel attacks
power side-channel countermeasures
Probes
pubcrawl
resilience
Resiliency
resource-constrained Internet-connected devices
Routing
side-channel analysis attacks
signature attenuation embedded CRYPTO
low-level metal routing
size 32.0 nm
size 65.0 nm
S℡LAR
S℡LAR hardware
system-level EM simulations
system-level implementation
telecommunication network routing
top-level metal layers
TSMC 65 nm CMOS technology
two-stage solution
white-box analysis
white box cryptography
white-box understanding
external attacker
composability
critical encryption signature
critical signal radiation
Cryptographic Hardware
Cryptography
EM leakage
EM probes
EM SCA attack
EM Side-channel attack
encryption
entire cryptographic core
entire crypto IP
example cryptographic block
CMOS integrated circuits
frequency 40.0 MHz
Generic countermeasure
generic EM side-channel attack protection
Ground-up EM Leakage Modeling
ground-up root-cause analysis
higher-level metal layers
high-resolution electromagnetic probes
integrated circuit
Integrated circuit modeling
Intel 32 nm CMOS technology interconnect stack
internet
lower-level metal layers
lower-level metal routing
biblio
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components
Submitted by K_Hooper on Wed, 05/02/2018 - 9:48am
exponentiation
backdoor-tolerance
Cryptographic Hardware
Hardware Trojans
Human behavior
Metrics
pubcrawl
Scalability
secure architecture
Tamper resistance
file
3D Security: Trustworthy System Security Through 3D Integrated Hardware
Submitted by Katie Dey on Tue, 10/30/2012 - 3:31pm. Contributors:
Ted Huffmire
Ryan Kastner
Timothy Sherwood
Cynthia Irvine
ABSTRACT
SaTC Posters
Cryptographic Hardware
embedded systems
Hardware-Oriented Security and Trust
Naval Postgraduate School
Trustworthy System Development
UC San Diego
UC Santa Barbara
0910734
SaTC PI Meeting 2012
Academia
Poster