Emerging devices have been designed and fabricated to extend Moore\u27s Law. While traditional metrics such as power, energy, delay, and area certainly apply to emerging device technologies, new devices may offer additional benefits in addition to improvements in the aforementioned metrics. In this sense, we consider how new transistor technologies could also have a positive impact on hardware security. More specifically, we consider how tunnel transistors (TFETs) could offer superior protection to integrated circuits and embedded systems that are subjected to hardware-level attacks - e.g., differential power analysis (DPA). Experimental results on a light-weight cryptographic circuit, KATAN32, show that TFET-based current mode logic (CML) ...
International audienceIn this communication, we propose to present the very recent research works we...
Abstract. This paper considers the security of Integrated Circuits (IC’s) against power analysis att...
The major challenge faced by electronic device designers is to defend the system from attackers and ...
Emerging devices have been designed and fabricated to extend Moore\u27s Law. While the benefits over...
The design of near future cryptocircuits will require greater performance characteristics in order t...
The design of secure circuits in emerging technologies is an appealing area that requires new effort...
The design of secure circuits in emerging technologies is an appealing area that requires new effort...
The design of near future cryptocircuits will require greater performance characteristics in order t...
The physical implementation of cryptographic algorithms may leak to some attacker security informati...
In this work, MOS Current Mode Logic (MCML) is analyzed for low power, low noise, mixed signal appli...
Power analysis attacks exploit the existence of "side channels" in implementations of cryptographic ...
Abstract. This paper describes a design method to secure encryption algorithms against Differential ...
Differential Power Analysis (DPA) is a powerful side channel attack aiming at recovering secret info...
This paper explores the resistance of MOS Current Mode Logic (MCML) against Differential Power Analy...
The continuous rise of static power consumption in modern CMOS technologies has led to the creation ...
International audienceIn this communication, we propose to present the very recent research works we...
Abstract. This paper considers the security of Integrated Circuits (IC’s) against power analysis att...
The major challenge faced by electronic device designers is to defend the system from attackers and ...
Emerging devices have been designed and fabricated to extend Moore\u27s Law. While the benefits over...
The design of near future cryptocircuits will require greater performance characteristics in order t...
The design of secure circuits in emerging technologies is an appealing area that requires new effort...
The design of secure circuits in emerging technologies is an appealing area that requires new effort...
The design of near future cryptocircuits will require greater performance characteristics in order t...
The physical implementation of cryptographic algorithms may leak to some attacker security informati...
In this work, MOS Current Mode Logic (MCML) is analyzed for low power, low noise, mixed signal appli...
Power analysis attacks exploit the existence of "side channels" in implementations of cryptographic ...
Abstract. This paper describes a design method to secure encryption algorithms against Differential ...
Differential Power Analysis (DPA) is a powerful side channel attack aiming at recovering secret info...
This paper explores the resistance of MOS Current Mode Logic (MCML) against Differential Power Analy...
The continuous rise of static power consumption in modern CMOS technologies has led to the creation ...
International audienceIn this communication, we propose to present the very recent research works we...
Abstract. This paper considers the security of Integrated Circuits (IC’s) against power analysis att...
The major challenge faced by electronic device designers is to defend the system from attackers and ...