default search action
HOST 2010: Anaheim, CA, USA
- Jim Plusquellic, Ken Mai:
HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, USA. IEEE Computer Society 2010, ISBN 978-1-4244-7810-1
Session 1: Attacks
- Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament:
Entropy-based Power Attack. 1-6 - Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES. 7-12 - Seetharam Narasimhan, Rajat Subhra Chakraborty, Dongdong Du, Somnath Paul, Francis G. Wolff, Christos A. Papachristou, Kaushik Roy, Swarup Bhunia:
Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach. 13-18
Session 2: Industrial
- Christopher J. Clark:
Anti-tamper JTAG TAP Design Enables DRM to JTAG Registers and P1687 on-chip Instruments. 19-24 - Bruce Newgard, Colby Hoffman:
Using Multiple Processors in a Single Reconfigurable Fabric for High-assurance Applications. 25-29
Session 3: Watermarking
- Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar:
Side-channel based Watermarks for Integrated Circuits. 30-35 - Daniel Ziener, Florian Baueregger, Jürgen Teich:
Multiplexing Methods for Power Watermarking. 36-41 - Farinaz Koushanfar, Yousra Alkabani:
Provably Secure Obfuscation of Diverse Watermarks for Sequential Circuits. 42-47
Poster Session
- Xinxin Fan, Guang Gong, Ken Lauffenburger, Troy Hicks:
FPGA Implementations of the Hummingbird Cryptographic Algorithm. 48-51 - Kazuyuki Tanimura, Nikil D. Dutt:
ExCCel: Exploration of Complementary Cells for Efficient DPA Attack Resistivity. 52-55 - Mainak Banga, Michael S. Hsiao:
Trusted RTL: Trojan Detection Methodology in Pre-silicon Designs. 56-59 - Kazuyuki Kobayashi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta, Miroslav Knezevic, Ünal Koçabas, Junfeng Fan, Ingrid Verbauwhede, Eric Xu Guo, Shin'ichiro Matsuo, Sinan Huang, Leyla Nazhandali, Akashi Satoh:
Prototyping Platform for Performance Evaluation of SHA-3 Candidates. 60-63 - Eric Menendez, Ken Mai:
A Comparison of Power-analysis-resistant Digital Circuits. 64-69 - Jeyavijayan Rajendran, Hetal Borad, Shyam Mantravadi, Ramesh Karri:
SLICED: Slide-based Concurrent Error Detection Technique for Symmetric Block Ciphers. 70-75
Session 4: Elliptic Curve Cryptography
- Junfeng Fan, Xu Guo, Elke De Mulder, Patrick Schaumont, Bart Preneel, Ingrid Verbauwhede:
State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures. 76-87 - Johann Heyszl, Frederic Stumpf:
Efficient One-pass Entity Authentication based on ECC for Constrained Devices. 88-93
Session 5: Physical Unclonable Functions
- Abhranil Maiti, Jeff Casarona, Luke McHale, Patrick Schaumont:
A Large Scale Characterization of RO-PUF. 94-99 - Chi-En Daniel Yin, Gang Qu:
LISA: Maximizing RO PUF's Secret Extraction. 100-105 - Mudit Bhargava, Cagla Cakir, Ken Mai:
Attack Resistant Sense Amplifier based PUFs (SA-PUF) with Deterministic and Controllable Reliability of PUF Responses. 106-111 - Kurt Rosenfeld, Efstratios Gavas, Ramesh Karri:
Sensor Physical Unclonable Functions. 112-117
Session 6: Implementations and Countermeasures
- Ekarat Laohavaleeson, Chintan Patel:
Current Flattening Circuit for DPA Countermeasure. 118-123 - Craig Teegarden, Mudit Bhargava, Ken Mai:
Side-channel Attack Resistant ROM-based AES S-Box. 124-129 - Akashi Satoh, Toshihiro Katashita, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki:
Hardware Implementations of Hash Function Luffa. 130-134 - Vikram B. Suresh, Wayne P. Burleson:
Entropy Extraction in Metastability-based TRNG. 135-140
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.