搜索结果: 1-15 共查到“军事学 FPGAs”相关记录27条 . 查询时间(0.046 秒)
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
eFPGA ASIC
2018/8/8
This work proposes the first fine-grained configurable cell array specifically tailored for cryptographic implementations. The proposed architecture can be added to future FPGAs as an application-spec...
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
TLS FPGA
2018/8/2
Thermal laser stimulation (TLS) is a failure analysis technique, which can be deployed by an adversary to localize and read out stored secrets in the SRAM of a chip. To this date, a few proof-of-conce...
Hardware Trojans have gained increasing interest during the past few years. Undeniably, the detection of such malicious designs needs a deep understanding of how they can practically be built and deve...
Architecture level Optimizations for Kummer based HECC on FPGAs
hyper-elliptic curve cryptography hardware implementation architecture exploration
2017/10/16
On the basis of a software implementation of Kummer based HECC over Fp presented in 2016, we propose new hardware architectures. Our main objectives are: definition of architecture parameters (type, s...
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
ICs FPGA
2017/9/1
Modern Integrated Circuits (ICs) employ several classes of countermeasures to mitigate physical attacks. Recently, a powerful semi-invasive attack relying on optical contactless probing has been intro...
Post-Quantum Key Exchange on FPGAs
Post-quantum cryptography lattice-based cryptography LWE
2017/7/21
The National Institute of Standards and Technology (NIST) announces the post-quantum crypto project, aiming to select cryptographic standard in the post-quantum era. The key establishment algorithm is...
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
Searchable Encryption Access Control Hardware Implementation
2017/7/11
The advent of cloud computing offers clients with the opportunity to outsource storage and processing of large volumes of shared data to third party service providers, thereby enhancing overall access...
Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs
Side-Channel Analysis Dual-Rail Localized EM
2017/6/27
Protecting cryptographic implementations against side-channel attacks is a must to prevent leakage of processed secrets. As a cell-level countermeasure, so called DPA-resistant logic styles have been ...
Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs
FPGA security bitstream fault injection automated key recovery
2016/6/22
This contribution is concerned with the question whether an adversary can automatically manipulate an unknown FPGA bitstream realizing a cryptographic primitive such that the underlying secret key is ...
No Place to Hide: Contactless Probing of Secret Data on FPGAs
FPGA Security Semi-Invasive Attack Laser Voltage Probing
2016/6/8
Field Programmable Gate Arrays (FPGAs) have been the target of different physical attacks in recent years. Many different countermeasures have already been integrated into these devices to mitigate th...
Faster discrete logarithms on FPGAs
attacks FPGAs ECC
2016/4/18
This paper accelerates FPGA computations of discrete logarithms on elliptic curves over binary fields. As an illustration, this paper reports successful completion of an attack against the SECG standa...
SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
Block Ciphers Light-Weight Cryptography
2016/1/23
While AES is extensively in use in a number of applications, its area cost limits its deployment in resource constrained platforms. In this paper, we have implemented SIMON, a recent promising low-c...
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
dual-rail precharge logic WDDL FPGA
2016/1/9
This work deals with DPA-resistant logic styles, i.e., celllevel
countermeasures against power analysis attacks that are known as
a serious threat to cryptographic devices. Early propagation and imb...
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Department of Electrical and Computer Engineering, Northeastern University
2016/1/6
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak
is built on Sponge construction and it provides a new MAC function called MAC-Keccak. These
new algorithms have raised ...
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs
side-channel protection FPGA hiding
2016/1/4
Designers of secure hardware are required to harden their implementations against physical threats, such as power analysis attacks. In particular, cryptographic hardware circuits are required to decor...