Benutzer: Gast  Login
Sortieren nach:
und:
Mehr ...

Baehr, Johanna;Zeh, Alexander
Post-Quantum Logic Locking
The obfuscation of a combinational logic circuit using logic locking is similar to symmetric cryptography and can be expressed in terms of a quantified Boolean function. Satisfiability checking algorithms are used to reveal the secret key of the logic locking (so-called SAT attacks). In this paper, we analyze the impact of quantum computers for these SAT-based attacks similar to the impact on symmetric cryptographic ciphers. For the first time to our knowledge, we propose modifications of existing logic locking schemes to achieve the same security level in a post-quantum era. Furthermore, we investigate dedicated countermeasures against SAT- based algorithms, suggest modifications and evaluate their effectiveness against quantum attacks.
2022

Mehr ...

Hepp, Alexander and Perez, Tiago and Pagliarini, Samuel and Sigl, Georg
A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design ICCAD
Association for Computing Machinery
2022

Mehr ...

Wagner, Alexander and Oberhansl, Felix and Schink, Marc
To Be, or Not to Be Stateful: Post-Quantum Secure Boot Using Hash-Based Signatures
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security ASHES
Association for Computing Machinery
2022

Mehr ...

Garb, Kathrin and Xhemrishi, Marvin and Kürzinger, Ludwig and Frisch, Christoph
The Wiretap Channel for Capacitive PUF-Based Security Enclosures
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022
165-191

Mehr ...

Selmke, Bodo and Pollanka, Maximilian and Duensing, Andreas and Strieder, Emanuele and Wen, Hayden and Mittermair, Michael and Kienberger, Reinhard and Sigl, Georg
On the application of Two-Photon Absorption for Laser Fault Injection attacks -- Pushing the physical boundaries for Laser-based Fault Injection
IACR Trans. Cryptogr. Hardw. Embed. Syst.
2022
2022
4
862--885

Mehr ...

Schamberger, Thomas and Holzbaur, Lukas and Renner, Julian and Wachter-Zeh, Antonia and Sigl, Georg
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem
Post-Quantum Cryptography
Springer International Publishing
2022

Mehr ...

Kestel, Claus and Frisch, Christoph and Pehl, Michael and Wehn, Norbert
Towards More Secure PUF Applications: A Low-Area Polar Decoder Implementation
2022 IEEE 35th International System-on-Chip Conference (SOCC)
2022

Mehr ...

Moghadas, Seyed Hamidreza and Pehl, Michael and Sigl, Georg
ROPAD+: Enhancing the Digital Ring Oscillator Probing Attempt Detector for Protecting Irregular Data Buses
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
2022
01
1--12

Mehr ...

Ruchti, Jonas;Gruber, Michael;Pehl, Michael
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022
2022
3

Mehr ...

Brunner, Michaela;Ibrahimpasic, Tarik;Li, Bing;Zhang, Grace Li;Schlichtmann, Ulf;Sigl, Georg
Timing Camouflage Enabled State Machine Obfuscation
2022 IEEE Physical Assurance and Inspection of Electronics (PAINE)
Huntsville, USA
2022