Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Sreeja Chowdhury"'
Autor:
Kazuki Monta, Lang Lin, Jimin Wen, Harsh Shrivastav, Calvin Chow, Hua Chen, Joao Geada, Sreeja Chowdhury, Nitin Pundir, Norman Chang, Makoto Nagata
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 19:1-23
Cryptography hardware is vulnerable to side-channel (SC) attacks on power supply current flow and electromagnetic (EM) emission. This article proposes simulation-based power and EM side-channel leakage analysis (SCLA) techniques on a cryptographic in
Publikováno v:
Journal of Cryptographic Engineering. 12:267-303
Over the past decades, quantum technology has seen consistent progress, with notable recent developments in the field of quantum computers. Traditionally, this trend has been primarily seen as a serious risk for cryptography; however, a positive aspe
Autor:
Lang Lin, Jimin Wen, Harsh Shrivastav, Weike Li, Hua Chen, Gang Ni, Sreeja Chowdhury, Calvin Chow, Norman Chang
Publikováno v:
2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 16:1-25
Permutation-based obfuscation has been proposed to protect hardware against cloning, overproduction, reverse engineering, and unauthorized operation. To prevent key extraction from memory, the key used by the obfuscation is usually stored in volatile
Publikováno v:
Emerging Topics in Hardware Security ISBN: 9783030644475
This chapter concerns how the evolution of quantum technology could influence the field of hardware security. Besides this question, the impact of hardware security on the quantum systems, and in particular, quantum cryptosystems, is discussed in det
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::50a49286b77da7e4568809b3c524e02d
https://doi.org/10.1007/978-3-030-64448-2_8
https://doi.org/10.1007/978-3-030-64448-2_8
A Weak Asynchronous RESet (ARES) PUF Using Start-up Characteristics of Null Conventional Logic Gates
Autor:
Jia Di, William Boullion, Mark Howard, Sreeja Chowdhury, Rabin Yu Acharya, Andrew Felder, Domenic Forte
Publikováno v:
ITC
Physical unclonable functions (PUFs) are widely researched security primitive in the digital and analog domain but have yet to be explored for asynchronous circuits. In this paper, we propose novel optimization methods to design a weak Asynchronous R
Publikováno v:
ISCAS
Scopus-Elsevier
Scopus-Elsevier
Remarked and recycled counterfeit integrated circuits (ICs) form a vast majority (80–90%) of the total number of counterfeit IC instances. Although different types of test strategies have been developed for recycled IC detection, techniques that
Publikováno v:
SN Computer Science. 1
Counterfeit electronics form a major roadblock towards a safe and successful economy. An increase in globalization has led to a major increase in the total number of counterfeit products all around the world. While several methods have been designed
Publikováno v:
HOST
Hardware intellectual property (IP) theft is a major issue in today’s globalized supply chain. To address it, numerous logic locking and obfuscation techniques have been proposed. While locking initially focused on digital integrated circuits (ICs)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f187f625eb868b8a65b8961d633d059e
http://arxiv.org/abs/2003.13904
http://arxiv.org/abs/2003.13904
Autor:
Nima Maghari, Beomsoo Park, David Munzer, Mark Tehranipoor, Domenic Forte, Mahbub Alam, Sreeja Chowdhury
Publikováno v:
Journal of Hardware and Systems Security. 2:15-32
In the last decade and so, a large amount of research has been done to secure hardware. Security features such as physically unclonable function (PUF), hardware metering, and obfuscation have been developed to protect hardware from threats. Detection