No abstract available.
Proceeding Downloads
Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices
Physical unclonable functions (PUFs) are promising hardware security primitives suitable for resource-constrained devices requiring lightweight cryptographic methods. However, PUF responses frequently suffer from instability due to varying environmental ...
Side-channel leakage aware instruction scheduling
Speed-optimized side-channel protected software implementations of block ciphers are important for the security of embedded IoT devices based on general-purpose microcontrollers. The recent work of Schwabe et al. published at SAC 2016 introduced a bit-...
Large scale characterization of SRAM on infineon XMC microcontrollers as PUF
SRAM-based physical unclonable functions (SRAM PUFs) derive a device dependent secret from the start-up pattern of their memory cells and have shown very promising results in previous publications. This work presents a dataset measured on 144 Infineon ...
Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS
- Frank K. Gürkaynak,
- Robert Schilling,
- Michael Muehlberghuber,
- Francesco Conti,
- Stefan Mangard,
- Luca Benini
Embedded systems for Internet-of-Things applications present new challenges to system design. From a hardware design perspective, energy efficiency is paramount, as most of devices have a limited power supply due to size considerations. Transmitting ...
TrustZone-backed bitcoin wallet
With the increasing popularity of virtual currencies, it has become more important to have highly secure devices in which to store private-key information. Furthermore, ARM has made available an extension of processors architectures, designated ...
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures
Secure implementations against side channel attacks usually combine hiding and masking protections in software implementations. In this work, we focus on desynchronization protection which is considered as a hiding countermeasure. The idea of ...
Index Terms
- Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems