Secure Physical Enclosures from Covers with Tamper-Resistance
IACR Transactions on Cryptographic Hardware and Embedded Systems
2018
2019
1
51-96
Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID
1-6
International Workshop on Information Forensics and Security 2019 (WIFS)
Delft, Netherlands
2019
A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography
In this paper, we propose a comprehensive framework for fair and efficient benchmarking of hardware implementations of lightweight cryptography (LWC). Our framework is centered around the hardware API (Application Programming Interface) for the implementations of lightweight authenticated ciphers, hash functions, and cores combining both functionalities. The major parts of our API include the minimum compliance criteria, interface, and communication protocol supported by the LWC core. The proposed API is intended to meet the requirements of all candidates submitted to the NIST Lightweight Cryptography standardization process, as well as all CAESAR candidates and current authenticated cipher and hash function standards. In order to speed-up the development of hardware implementations compliant with this API, we are making available the LWC Development Package and the corresponding Implementer’s Guide. Equipped with these resources, hardware designers can focus on implementing only a core functionality of a given algorithm. The development package facilitates the communication
with external modules, full verification of the LWC core using simulation, and generation of optimized results. The proposed API for lightweight cryptography is a superset of the CAESAR Hardware API,
endorsed by the organizers of the CAESAR competition, which was successfully used in the development of over 50 implementations of Round 2 and Round 3 CAESAR candidates. The primary extensions include
support for optional hash functionality and the development of cores resistant against side-channel attacks. Similarly, the LWC Development Package is a superset of the part of the CAESAR Development Package
responsible for support of Use Case 1 (lightweight) CAESAR candidates. The primary extensions include support for hash functionality, increasing the flexibility of the code shared among all candidates, as well as
extended support for the detection of errors preventing the correct operation of cores during experimental testing. Overall, our framework supports (a) fair ranking of candidates in the NIST LWC standardization
process from the point of view of their efficiency in hardware before and after the implementation of countermeasures against side-channel attacks, (b) ability to perform benchmarking within the limited time devoted to Round 2 and any subsequent rounds of the NIST LWC standardization process, (c) compatibility among implementations of the same algorithm by different designers and (d) fast deployment of the best algorithms in real-life applications.
2019
Hardware API for Lightweight Cryptography
In this paper, we define the Lightweight Cryptography (LWC)
Hardware Application Programming Interface (API) for the implementations
of lightweight authenticated ciphers, hash functions, and cores
combining both functionalities. In particular, our API is intended to meet
the requirements of all candidates submitted to the NIST Lightweight
Cryptography standardization process. The major parts of our specification
include minimum compliance criteria, interface, communication
protocol, and timing characteristics supported by the LWC core. All
of these criteria have been defined with the goals of guaranteeing (a)
compatibility among implementations of the same algorithm by different
designers, and (b) fair benchmarking of hardware cores implementing an
authenticated cipher, a hash function, or both functionalities. Since 2016,
a similar API has been successfully used to implement and benchmark
all candidates qualified to Rounds 2 and 3 of the CAESAR competition
for authenticated ciphers.
2019
Implementer’s Guide to Hardware Implementations Compliant with the Hardware API for Lightweight Cryptography
2019
Post-quantum key exchange mechanism for safety critical systems
17th escar Europe: embedded security in cars (Konferenzveröffentlichung)
xx
2019
KeLiPUF: a key-distribution protocol for lightweight devices using Physical Unclonable Functions
17th escar Europe : embedded security in cars (Konferenzveröffentlichung)
17th escar Europe : embedded security in cars (Konferenzveröffentlichung)
2019
On the Confidence in Bit-Alias Measurement of Physical Unclonable Functions
17th IEEE International New Circuits and Systems Conference (NEWCAS)
München
2019
Breaking TrustZone Memory Isolation Through Malicious Hardware on a Modern FPGA-SoC
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop
London, United Kingdom
ACM
2019
Persistent Fault Analysis of OCB, DEOXYS and COLM
2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
Atlanta, USA
2019