A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimal First-Order Boolean Masking for Embedded IoT Devices
[chapter]
2018
Lecture Notes in Computer Science
Then, we compare the efficiency of first-order masked implementations of three lightweight block ciphers on an ARM Cortex-M3 to determine which design strategies are most suitable for efficient masking ...
All our masked implementations passed the t-test evaluation and thus are deemed secure against first-order side-channel attacks. ...
The authors thank the anonymous reviewers for their valuable comments. The work of Aleksei Udovenko is supported by the Fonds National de la Recherche, Luxembourg (project reference 9037104). ...
doi:10.1007/978-3-319-75208-2_2
fatcat:fimqzo4inzbdfgz5bh6r22l3r4
Integrative Acceleration of First-order Boolean Masking for Embedded IoT Devices
2019
Journal of Information Processing
., secure against the first-order side-channel attack, with the ISO/IEC17825 test. ...
Physical attacks, especially side-channel attacks, are threats to IoT devices which are located everywhere in the field; and therefore, protecting such devices against side-channel attacks is one of our ...
We would like to thank anonymous reviewers for their fruitful comments on the previous version of this manuscript. A part of this work is supported by JSPS KAKENHI Grant Number 18H05289. ...
doi:10.2197/ipsjjip.27.585
fatcat:ohuwn6uy4jhhfohfayvril2x44
Assessment of Addition-Chain-Based Masked S-Box Using Deep-Learning-Based Side-Channel Attacks
2022
Security and Communication Networks
In simulated experiments, we perform DL-SCAs on first-order masked implementations with different noise levels and training trace numbers. ...
Masking schemes are considered to be effective countermeasures to protect Internet-of-Things devices from side-channel attacks. ...
Considering d � 1 in the first-order Boolean masking, the MI results of AES S-Box and monomial functions are depicted in Figure 2 . ...
doi:10.1155/2022/7771621
doaj:5d612421201d4f8bb4d93eddda1bbcee
fatcat:lofa5n2fdfhbtnexdz33xnefum
Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor
2019
Applied Sciences
Masking conversion algorithms can be classified into two categories: "Boolean to Arithmetic (B2A)" and "Arithmetic to Boolean (A2B)". ...
First, we specifically show how to reduce the pre-computation table from ( k + 1 ) -bit to ( k ) -bit, as a result, the memory use for the pre-computation table is reduced from ( 2 ( k + 1 ) ) ( k + 1 ...
Therefore, optimization studies for the high-order masking of conversion algorithms should continue. ||r) mod 2 (n−2)·k = x − R − (r|| . . . ...
doi:10.3390/app9071438
fatcat:cioywcnjffcyfeclw4r6yx6o7e
An Efficient and Low-Power Design of the SM3 Hash Algorithm for IoT
2019
Electronics
Thus, the design accommodates the resource-limited IoT security devices very well. The proposed architecture is applied to an intelligent security gateway device. ...
The Internet-of-Things (IoT) has a security problem that has become increasingly significant. New architecture of SM3 which can be implemented in loT devices is proposed in this paper. ...
For example, the static or dynamic analysis of the firmware and the source code running on IoT devices is used to discover and cope with the potential vulnerabilities for IoT devices [5] . ...
doi:10.3390/electronics8091033
fatcat:eh6a273prba7zbztg6ftgzhapq
Can Ternary Computing Improve Information Assurance?
2018
Cryptography
We suggest that balanced ternary logic can be valuable to Internet of Things (IoT) security, authentication of connected vehicles, as well as hardware and software assurance, and have developed a ternary ...
The mainstream technologies used to manufacture embedded microcontrollers for IoT networks can offer, at little cost, CMOS devices with multiple thresholds to design heterogeneous binary/ternary units. ...
Often the constellation of IoTs does not have enough embedded security. Interaction with people and social engineering represent an additional set of opportunities for malicious parties. ...
doi:10.3390/cryptography2010006
fatcat:5pxyflzvsffglggmjvmk2kjovu
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
2018
Transactions on Cryptographic Hardware and Embedded Systems
These countermeasures employ memory units to store generated random numbers and reuse them in subsequent computations,making them primarily suitable for implementation on devices with sufficient memory ...
maximize the security level achieved for a certain cost. ...
Acknowledgments I would like to thank Lejla Batina, Joan Daemen and Vincent Grosso for their feedback comments and the discussions towards SASCA. ...
doi:10.13154/tches.v2018.i3.524-546
dblp:journals/tches/Papagiannopoulos18
fatcat:ro3ypd2nfvfd7gcflbvlz3jtdy
Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares
[chapter]
2017
Lecture Notes in Computer Science
Applying masking to a cipher that involves both arithmetic and Boolean operations requires a conversion between arithmetic and Boolean masks. ...
At FSE 2015, Coron et al. proposed a logarithmic-time algorithm for modular addition on Boolean shares based on the Kogge-Stone carry-lookahead adder. ...
Goubin was the first to describe secure algorithms for conversion between arithmetic and Boolean masks in [9] . ...
doi:10.1007/978-3-319-69659-1_3
fatcat:uweahyajcjhdlmy2daiewhacs4
A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications
[article]
2022
arXiv
pre-print
To the best of our knowledge, the proposed method is the first length-flexible lightweight, high-performing cancelable fingerprint template design for resource-constrained IoT applications. ...
However, to suit resource-constrained IoT devices, oversimplified templates would compromise authentication performance significantly. ...
For the cell validity part, we use the OR Boolean operator to concatenate four neighboring cell masks so that valid cells can remain. ...
arXiv:2206.12864v1
fatcat:qnw3jfyoivem5imm6hzuxwkffm
Systematic Approach for State-of-the-Art Architectures and System-on-chip Selection for Heterogeneous IoT Applications
2021
IEEE Access
To select specific system-on-chip (SoC) architecture for heterogeneous IoT applications, a genetic algorithm (GA) based optimization method is implemented in MATLAB. ...
This article helps the researchers and field engineers to comprehend the microarchitecture device configurations and to identify the superior SoC for next-generation IoT practices. ...
Table 13 illustrates the confusion matrix table in which the devices assign with Boolean representation. For highend devices, the Boolean value allocated as 1, and for basic devices, the value is 0. ...
doi:10.1109/access.2021.3055650
fatcat:n5yo3savcjdyxdolpwrlc5dza4
A Configurable RO-PUF for Securing Embedded Systems Implemented on Programmable Devices
2021
Electronics
RO-PUF implementation on programmable logic devices is conceived to minimize the use of available resources, while operating speed can be optimized by properly selecting the size of the elements used to ...
The work also describes the interface added to the PUF to facilitate its incorporation as hardware Intellectual Property (IP)-modules into embedded systems. ...
embedded system applications, such as IoT. ...
doi:10.3390/electronics10161957
fatcat:wl5pvs6yovhw5o24kxpnrypnai
Mind the Gap: Towards Secure 1st-Order Masking in Software
[chapter]
2017
Lecture Notes in Computer Science
Last, we craft the first (to our knowledge) "hardened" 1st-order ISW-based, masked Sbox implementation, which is capable of resisting 1st-order, univariate side-channel attacks. ...
First, we perform an in-depth investigation of the device-specific effects that invalidate ILA in the AVR microcontroller ATMega163. ...
Background
Boolean Masking & Order Reduction Chari et al., Goubin et al. and Messerges [9, 15, 21] were among the first to suggest splitting intermediate values with a secret sharing scheme, in order ...
doi:10.1007/978-3-319-64647-3_17
fatcat:2ylhgsvbxbcnjnczhafnmxilmm
Correlation Differential Power Analysis Attack to Midori64
[article]
2021
arXiv
pre-print
Today, Internet communication security has become more complex as technology becomes faster and more efficient, especially for resource-limited devices such as embedded devices, wireless sensors, and radio ...
Lightweight encryption algorithms provide security for these devices to protect data against intruders. ...
Mahdavi for their kind contributions during this paper. ...
arXiv:2108.11115v1
fatcat:7bsha7noszesveqkywxuxoitym
Assertive, Selective, Scalable IoT-Based Warning System
2022
Sensors
and ideas for further developments. ...
They are built to support a multitude of data from an IoT system and scale very well with the system. ...
Acknowledgments: We would like to thank the reviewers for their time and expertise, constructive comments and valuable insight.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s22031015
pmid:35161759
pmcid:PMC8840114
fatcat:ae2qkv5bfjhrdkpl5mdcc4km6m
A Memory Hierarchy Protected against Side-Channel Attacks
2022
Cryptography
Many first-order side-channel attacks have been reported on all its components from the main memory to the CPU registers. ...
Only 8-bit Initialization Vectors are stored for each mask value to enable further recomputation of the masks. ...
In the rest of this paper, when referring to masking, we imply first order boolean masking for hardware modules. ...
doi:10.3390/cryptography6020019
fatcat:asl6bft22ndclmt2u44vajfkle
« Previous
Showing results 1 — 15 out of 353 results