2017
DOI: 10.1109/jssc.2016.2611678
|View full text |Cite
|
Sign up to set email alerts
|

A Nonvolatile Flip-Flop-Enabled Cryptographic Wireless Authentication Tag With Per-Query Key Update and Power-Glitch Attack Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Taking into account the positive world experience of cryptographic competitions CRYPTREC [13], NESSIE [14], AES [15] and SHA3 [16], the State Service for Special Communications and Data Protection of Ukraine successfully held a national open competition of symmetric block cryptographic algorithms in 2007-2010 [17], which defeated the algorithm "Kalyna" [18], Kharkiv developers of the Institute of Information Technology [19], on the basis of which the national standard of Ukraine was developed [20]. As it has been described above, the new algorithm should provide greater cryptographic transformation speed compared to the AES algorithm [5], as well as have a higher level of stability against AES [5].…”
Section: Analysis Of Recent Research and Publicationsmentioning
confidence: 99%
“…Taking into account the positive world experience of cryptographic competitions CRYPTREC [13], NESSIE [14], AES [15] and SHA3 [16], the State Service for Special Communications and Data Protection of Ukraine successfully held a national open competition of symmetric block cryptographic algorithms in 2007-2010 [17], which defeated the algorithm "Kalyna" [18], Kharkiv developers of the Institute of Information Technology [19], on the basis of which the national standard of Ukraine was developed [20]. As it has been described above, the new algorithm should provide greater cryptographic transformation speed compared to the AES algorithm [5], as well as have a higher level of stability against AES [5].…”
Section: Analysis Of Recent Research and Publicationsmentioning
confidence: 99%
“…On the contrary, when the positioning ratio is 3:7, V PPM does not reach to V REF2 during CLK ¼ 1, resulting in DATA ¼ 0. While this design example utilizes analog components, such as the current sources, I 2 and I 3 , and capacitor, C 7 , to demodulate the data bits, the full-digital counter-based PPM demodulator can be also adopted for more robust and low-power design (Lee et al 2017).…”
Section: Single-carrier Data Telemetrymentioning
confidence: 99%
“…Figure 9 shows the schematic diagram of the LSK demodulator in the power Tx as a design example (Lee et al 2017). While the power Tx transfers the power carrier to the Rx, it also receives the back telemetry signals through LSK modulation, which closes switches across L2 in the Rx depending on the data bits to generate voltage variations across L1 in the Tx.…”
Section: Backward (Uplink) Data Telemetry Passive Data Telemetrymentioning
confidence: 99%
See 1 more Smart Citation