• Publications
  • Influence
Test Versus Security: Past and Present
TLDR
We present a survey on the state-of-the-art in scan-based side-channel attacks on symmetric and public-key cryptographic hardware implementations, both in the absence and presence of advanced DfT structures. Expand
  • 66
  • 4
  • PDF
Secure JTAG Implementation Using Schnorr Protocol
TLDR
In this paper we propose a novel architecture that implements a secure JTAG interface. Expand
  • 31
  • 3
  • PDF
On the Implementation of Unified Arithmetic on Binary Huff Curves
TLDR
We show the actual power consumption graphs of those operations on a FPGA platform and propose a modified arithmetic and its suitable implementation technique. Expand
  • 9
  • 3
  • PDF
Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications
TLDR
This article focuses on detecting attacks to power system with the help of cyber-physical co-modeling. Expand
  • 22
  • 2
POWERT Channels: A Novel Class of Covert CommunicationExploiting Power Management Vulnerabilities
TLDR
We demonstrate how power management vulnerabilities can enable covert communication over a previously unexplored, novel class of covert channels which we refer to as POWERT channels. Expand
  • 19
  • 2
  • PDF
PUF-based secure test wrapper design for cryptographic SoC testing
TLDR
We enhance the secure test wrapper allowing testing of multiple IP blocks using a PUF-based authentication mechanism which overcomes the necessity of secure NVM and reduces the implementation overhead. Expand
  • 36
  • 1
  • PDF
Challenge-response based secure test wrapper for testing cryptographic circuits
TLDR
We propose a secure challenge-response based Secure Test Wrapper structure, suitable for testing IP cores in a SoC environment, which provides full testability, very high security and scalability of the proposed design. Expand
  • 9
  • 1
  • PDF
Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms
TLDR
This paper presents a performance comparison of new authenticated encryption (AE) algorithms which are aimed at providing better security and resource efficiency compared to existing standards. Expand
  • 5
  • 1
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
TLDR
We perform a comprehensive area, power, and energy analysis of some of the most recently-developed lightweight block ciphers and we compare them to the standard AES algorithm. Expand
  • 49
  • PDF