The emergence of new devices to be used in low-power applications are expected to reach impressive performance compared to those obtained by equivalent CMOS counterparts. However, when used in lightweight security applications, these emerging paradigms are required to be reliable and safe enough during the task of protecting important and valuable data. In this work, the usage of HyperFET devices for security applications has been analyzed and new paradigms for enhancing security against Power Analysis attacks have been developed for the first time. To perform this analysis, classical dual-precharge logic primitives implemented with 14nm FinFET have been upgraded to incorporate HyperFET devices. The proposed primitives incorporating HyperFE...
In the Internet of Things (IoT), many strong constraints have to be considered when designing the co...
Abstract. Recent developments in information technologies made the secure transmission of digital da...
This paper reports on the security of cryptographic algorithms implemented on FPGAs against power an...
The emergence of new devices to be used in low-power applications are expected to reach impressive p...
The design of near future cryptocircuits will require greater performance characteristics in order t...
The design of near future cryptocircuits will require greater performance characteristics in order t...
The design of secure circuits in emerging technologies is an appealing area that requires new effort...
The design of secure circuits in emerging technologies is an appealing area that requires new effort...
Emerging devices have been designed and fabricated to extend Moore\u27s Law. While the benefits over...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
Power analysis presents the typical example of successful attacks against trusted cryptographic devi...
We consider how the I-V characteristics of emerging transistors (particularly those sponsored by STA...
Emerging devices have been designed and fabricated to extend Moore\u27s Law. While traditional metri...
Power analysis attacks exploit the existence of "side channels" in implementations of cryptographic ...
In the Internet of Things (IoT), many strong constraints have to be considered when designing the co...
Abstract. Recent developments in information technologies made the secure transmission of digital da...
This paper reports on the security of cryptographic algorithms implemented on FPGAs against power an...
The emergence of new devices to be used in low-power applications are expected to reach impressive p...
The design of near future cryptocircuits will require greater performance characteristics in order t...
The design of near future cryptocircuits will require greater performance characteristics in order t...
The design of secure circuits in emerging technologies is an appealing area that requires new effort...
The design of secure circuits in emerging technologies is an appealing area that requires new effort...
Emerging devices have been designed and fabricated to extend Moore\u27s Law. While the benefits over...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
Power analysis presents the typical example of successful attacks against trusted cryptographic devi...
We consider how the I-V characteristics of emerging transistors (particularly those sponsored by STA...
Emerging devices have been designed and fabricated to extend Moore\u27s Law. While traditional metri...
Power analysis attacks exploit the existence of "side channels" in implementations of cryptographic ...
In the Internet of Things (IoT), many strong constraints have to be considered when designing the co...
Abstract. Recent developments in information technologies made the secure transmission of digital da...
This paper reports on the security of cryptographic algorithms implemented on FPGAs against power an...