2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020
DOI: 10.1109/isvlsi49217.2020.00039
|View full text |Cite
|
Sign up to set email alerts
|

Securing Network-on-Chip Using Incremental Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…If the NIs are assumed trusted (in-house design), the countermeasure(s) can be integrated within the NI units. Many researchers have integrated their security solutions in the NI units, e.g., bulky modules for symmetric and asymmetric cryptography [40], [49], [50]. Also, most countermeasures that guarantee secure memory access are implemented in the NI.…”
Section: Wired Nocs Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…If the NIs are assumed trusted (in-house design), the countermeasure(s) can be integrated within the NI units. Many researchers have integrated their security solutions in the NI units, e.g., bulky modules for symmetric and asymmetric cryptography [40], [49], [50]. Also, most countermeasures that guarantee secure memory access are implemented in the NI.…”
Section: Wired Nocs Countermeasuresmentioning
confidence: 99%
“…To reduce the cost of AES and still add high level of security, the authors of [50] adopted the Hummingbird-2 [60] block cipher scheme. Hummingbird-2 is a lightweight encryption which is mostly implemented in RFID tags.…”
Section: A Data Confidentiality Countermeasuresmentioning
confidence: 99%
“…Charles and Mishra [8] proposed to secure data routing in NoC using incremental cryptography [9]. Incremental cryptography has significant improvement over traditional cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Note that this experiment has a much larger data set than that in Fig. 3 (i.e., 1,024 = 2 10 ), because we will to a large extent vary both the number of pivots 𝑝 = 𝑛 π‘₯ , 2 ≀ π‘₯ ≀ 5 (π‘₯ is considered as a practical upper bound in complexity theory [5]), and the number of nuances 𝑑 = 𝑛 𝑦 , π‘₯ ≀ 𝑦. We set 𝑛 = 32, meaning that there are potential 2 32 distinct values in the underlying data set.…”
Section: Encoding Randomly Generated Numbersmentioning
confidence: 99%
“…The previous sections assume that there is sufficient memory capacity to accommodate 𝑝 pivots and 𝑑 nuances. In certain application scenarios (e.g., edge computing [1], supply chains [30], systemon-chip [10]), we might have limited resources and may not be able to hold, say, 2 32 nuances as in Fig. 2.…”
Section: Computing Nuances On-the-flymentioning
confidence: 99%