A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design ICCAD
Association for Computing Machinery
2022
To Be, or Not to Be Stateful: Post-Quantum Secure Boot Using Hash-Based Signatures
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security ASHES
Association for Computing Machinery
2022
The Wiretap Channel for Capacitive PUF-Based Security Enclosures
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022
165-191
On the application of Two-Photon Absorption for Laser Fault Injection attacks -- Pushing the physical boundaries for Laser-based Fault Injection
IACR Trans. Cryptogr. Hardw. Embed. Syst.
2022
2022
4
862--885
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem
Post-Quantum Cryptography
Springer International Publishing
2022
Towards More Secure PUF Applications: A Low-Area Polar Decoder Implementation
2022 IEEE 35th International System-on-Chip Conference (SOCC)
2022
ROPAD+: Enhancing the Digital Ring Oscillator Probing Attempt Detector for Protecting Irregular Data Buses
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
2022
01
1--12
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022
2022
3
Timing Camouflage Enabled State Machine Obfuscation
2022 IEEE Physical Assurance and Inspection of Electronics (PAINE)
Huntsville, USA
2022