2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2018
DOI: 10.1109/hst.2018.8383903
|View full text |Cite
|
Sign up to set email alerts
|

Chaos computing for mitigating side channel attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Additionally, some types of cryptography were believed to be resistant to SCA by their nature. For example, chaos cryptography [ 82 , 83 ] was expected to be hard to attack because of its unpredictable behaviour [ 84 ]. Nevertheless, these beliefs were disproven, e.g., by a study showing that the chaos-based S-Boxes are similarly vulnerable to SCA as the AES ones [ 85 ].…”
Section: Countermeasures Against Attacksmentioning
confidence: 99%
“…Additionally, some types of cryptography were believed to be resistant to SCA by their nature. For example, chaos cryptography [ 82 , 83 ] was expected to be hard to attack because of its unpredictable behaviour [ 84 ]. Nevertheless, these beliefs were disproven, e.g., by a study showing that the chaos-based S-Boxes are similarly vulnerable to SCA as the AES ones [ 85 ].…”
Section: Countermeasures Against Attacksmentioning
confidence: 99%
“…For obfuscation applications, it is highly desirable to have a large functionality space so that multiple reliable configurations can be chosen for implementing a single function. This can be leveraged to ensure the security of chaosbased computing systems against side-channel power analysis based attacks [7], [14]. Previously, this was achieved using many iterations but this poses a problem since the resulting gate becomes increasingly unreliable.…”
Section: Enhancement Of the Functionality Spacementioning
confidence: 99%
“…This approach can significantly reduce the overhead for implementing complex logic functions. Moreover, as shown in [14], oftentimes we only have to replace a small percentage of total gates with chaos-based implementation to benefit from the resulting security advantages.…”
Section: Enhancement Of the Functionality Spacementioning
confidence: 99%
“…G 4 FET inspired multiple state electrostatically formed nanowires have already been used for threshold logic functions [6] and high-sensitivity gas sensing [7]. Another potential application is to leverage the tunable tent map shape characteristics of the voltage controlled G 4 NDR circuit [2] to build chaotic logic gates for hardware security applications [8,9].…”
Section: Silicon-on-insulator (Soi) Four Gate Field Effect Transistormentioning
confidence: 99%