Proceedings of the 2021 Great Lakes Symposium on VLSI 2021
DOI: 10.1145/3453688.3461761
|View full text |Cite
|
Sign up to set email alerts
|

Side-channel Resistant Implementations of a Novel Lightweight Authenticated Cipher with Application to Hardware Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Abdulgadir et al [1] have provided lightweight sidechannel resistant implementations of TinyJAMBU for hardware security applications considering the issue of protecting intellectual property (IP) from theft. This was done with the aim of ensuring that the area and power consumption remained significantly lower than current standards, such as AES-GCM.…”
Section: Related Workmentioning
confidence: 99%
“…Abdulgadir et al [1] have provided lightweight sidechannel resistant implementations of TinyJAMBU for hardware security applications considering the issue of protecting intellectual property (IP) from theft. This was done with the aim of ensuring that the area and power consumption remained significantly lower than current standards, such as AES-GCM.…”
Section: Related Workmentioning
confidence: 99%
“…Through this approach, researchers are able to integrate the advantages of conventional cryptographic methods with the advancements provided by machine learning, leading to the development of encryption approaches that are both more resilient and efficient for devices with limited resources. The authors [27] employ machine learning techniques to identify possible security risks in IoT devices, recognizing the inherent vulnerabilities associated with side-channel attacks. The research highlights the crucial significance of machine learning in safeguarding the security of cryptographic implementations inside the continuously expanding IoT environment.…”
Section: Related Workmentioning
confidence: 99%
“…This thus makes it susceptible to leaking information that can be easily analysed with first-order DPA to uncover secret information. In fact, [60] shows an unprotected implementation of Tiny-Jambu, on which an experiment with 10,000 traces yielded a test vector leakage assessment (TVLA) higher than 5. This is above the threshold of 4.5 widely accepted as the limit to which an implementation said is considered secure.…”
Section: Scheme For Attacking Tinyjambumentioning
confidence: 99%
“…Thus, implementations of unprotected TinyJambu with a block size of 32 bits [60] require the key to be accepted during the initialisation phase in at least 4 words of 32 bits each maximum. The process of accepting and storing the 32‐bit data and then implementing parallel computations of 32 feedback bits with the NLFSR will generate power consumption that a malicious agent can exploit to run CPA.…”
Section: Evaluation Of Residual Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation