SIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). Safeguarding such resource-constrained hardware from side-channel attacks poses a significant challenge. Adiabatic circuit operation has recently received attention for such applications due to ultra-low power consumption. In this work, a charge-based methodology is developed to mount a correlation power analysis (CPA) based side-channel attack to an adiabatic SIMON core. The charge-based method significantly reduces the attack complexity by reducing the required number of power samples by two orders of magnitude. The CPA results demonstrate that the required measurements-to-disclosure (MTD) to r...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its v...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Internet of Things (IoT) is a collection of devices that exchange data through a network to implemen...
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but ty...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are cons...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
In this paper, we propose Without Charge Sharing Quasi Adiabatic Logic (WCS-QuAL) as a countermeasur...
Determination of an adequate level of security and providing subsequent mechanisms to achieve it, is...
Existing secure adiabatic logic designs use charge sharing inputs to deliver input independent energ...
Security in Internet of Things (IoT) applications is more important than ever. New devices are pushe...
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret ...
Side Channel Attacks (SCA) exploit weaknesses in implementations of cryptographic functions resultin...
On the whole existing secure adiabatic logic designs exhibit variations in current peaks and have as...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its v...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
Internet of Things (IoT) is a collection of devices that exchange data through a network to implemen...
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but ty...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are cons...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
In this paper, we propose Without Charge Sharing Quasi Adiabatic Logic (WCS-QuAL) as a countermeasur...
Determination of an adequate level of security and providing subsequent mechanisms to achieve it, is...
Existing secure adiabatic logic designs use charge sharing inputs to deliver input independent energ...
Security in Internet of Things (IoT) applications is more important than ever. New devices are pushe...
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret ...
Side Channel Attacks (SCA) exploit weaknesses in implementations of cryptographic functions resultin...
On the whole existing secure adiabatic logic designs exhibit variations in current peaks and have as...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its v...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...