Post-Quantum Logic Locking
The obfuscation of a combinational logic circuit using logic locking is similar to symmetric cryptography and can be expressed in terms of a quantified Boolean function. Satisfiability checking algorithms are used to reveal the secret key of the logic locking (so-called SAT attacks). In this paper, we analyze the impact of quantum computers for these SAT-based attacks similar to the impact on symmetric cryptographic ciphers. For the first time to our knowledge, we propose modifications of existing logic locking schemes to achieve the same security level in a post-quantum era. Furthermore, we investigate dedicated countermeasures against SAT- based algorithms, suggest modifications and evaluate their effectiveness against quantum attacks.
2022
A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design ICCAD
Association for Computing Machinery
2022
To Be, or Not to Be Stateful: Post-Quantum Secure Boot Using Hash-Based Signatures
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security ASHES
Association for Computing Machinery
2022
The Wiretap Channel for Capacitive PUF-Based Security Enclosures
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022
165-191
On the application of Two-Photon Absorption for Laser Fault Injection attacks -- Pushing the physical boundaries for Laser-based Fault Injection
IACR Trans. Cryptogr. Hardw. Embed. Syst.
2022
2022
4
862--885
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem
Post-Quantum Cryptography
Springer International Publishing
2022
Towards More Secure PUF Applications: A Low-Area Polar Decoder Implementation
2022 IEEE 35th International System-on-Chip Conference (SOCC)
2022
ROPAD+: Enhancing the Digital Ring Oscillator Probing Attempt Detector for Protecting Irregular Data Buses
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
2022
01
1--12
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022
2022
3
Timing Camouflage Enabled State Machine Obfuscation
2022 IEEE Physical Assurance and Inspection of Electronics (PAINE)
Huntsville, USA
2022