Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
size 45.0 nm
biblio
Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method
Submitted by aekwall on Mon, 11/09/2020 - 12:32pm
integrated circuit industry
IP piracy
application specific integrated circuits
ASIC technology
circuit complexity
combinational circuits
finite state machine
FSM obfuscation method
hardware obfuscation method
Hardware Security
IP overproduction
ITC99 circuit benchmarks
logic encryption
Logic masking
Mystic obfuscation approach
Mystic protection method
mystifying IP cores
Logic gates
Hardware
Resiliency
pubcrawl
composability
policy-based governance
Production
Complexity theory
microprocessor chips
IP networks
obfuscation
reverse engineering
encoding
finite state machines
logic circuits
logic design
size 45.0 nm
biblio
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
Submitted by aekwall on Mon, 01/20/2020 - 10:59am
side channel analysis attacks
narrow bandpass filtering
optimal leakage models
parallel round-based datapath
PRINCE
pubcrawl
Resiliency
resource constraints
round unrolled implementations
round unrolling
Scalability
side channel analysis
multiband narrow bandpass filtering techniques
side channel signatures
side-channel leakage
signal isolation
Signal to noise ratio
signal-to-noise ratio
SIMON
SIMON datapaths
size 45.0 nm
SNR
time domain correlation power analysis
Energy Efficiency
AES
AES algorithm
Band-pass filters
Ciphers
combinational logics
Correlation
correlation frequency analysis
Cryptography
edge nodes
encryption
advanced encryption standard
field programmable gate arrays
Filtering
first-order side-channel leakages
FPGA
fully-unrolled datapath
Hardware
improved CFA attack
leakage models
Lightweight Ciphers
lightweight cryptographic algorithms