{"title":"Deployment of EMC techniques in design of IC chips for hardware security","authors":"","doi":"10.1049/pbcs066e_ch3","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch3","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124146602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Back Matter","authors":"","doi":"10.1049/pbcs066e_bm","DOIUrl":"https://doi.org/10.1049/pbcs066e_bm","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Confidential and energy-efficient cognitive communications by physical-layer security","authors":"","doi":"10.1049/pbcs066e_ch13","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch13","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125037799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, S. Bhasin, Xin-jie Zhao, Shize Guo, K. Ren
{"title":"Improvements and recent updates of persistent fault analysis on block ciphers","authors":"Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, S. Bhasin, Xin-jie Zhao, Shize Guo, K. Ren","doi":"10.1049/pbcs066e_ch2","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch2","url":null,"abstract":"Persistence is an intrinsic nature of many errors yet has not been caught enough attractions for years. In this chapter, the feature of persistence is applied to fault attacks (FAs), and the persistent FA is proposed. Different from traditional FAs, adversaries can prepare the fault injection stage before the encryption stage, which relaxes the constraint of the tight-coupled time synchronization. The persistent fault analysis (PFA) is elaborated on different implementations of AES-128, specially fault-hardened implementations based on dual modular redundancy (DMR). Our experimental results show that PFA is quite simple and efficient in breaking these typical implementations. To show the feasibility and practicability of our attack, a case study is illustrated on a few countermeasures of masking. This work puts forward a new direction of FAs and can be extended to attack other implementations under more interesting scenarios.","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"44 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120992610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Micro-architectural attacks and countermeasures on public-key implementations","authors":"","doi":"10.1049/pbcs066e_ch7","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch7","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122379334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating homomorphic encryption in hardware: a review","authors":"","doi":"10.1049/pbcs066e_ch11","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch11","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116198774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security implications of non-digital components","authors":"","doi":"10.1049/pbcs066e_ch10","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch10","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating the CACHEKIT attack","authors":"","doi":"10.1049/pbcs066e_ch8","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch8","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126383864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical-layer security for mmWave massive MIMO communications in 5G networks","authors":"","doi":"10.1049/pbcs066e_ch14","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch14","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Silicon-based true random number generators","authors":"","doi":"10.1049/pbcs066e_ch6","DOIUrl":"https://doi.org/10.1049/pbcs066e_ch6","url":null,"abstract":"","PeriodicalId":162240,"journal":{"name":"Frontiers in Hardware Security and Trust; Theory, design and practice","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}