Exploring Remote Power Attacks Targeting Parallel Data Encryption On Multi-Tenant FPGAs
Abstract
References
Index Terms
- Exploring Remote Power Attacks Targeting Parallel Data Encryption On Multi-Tenant FPGAs
Recommendations
Voltage Sensor Implementations for Remote Power Attacks on FPGAs
This article presents a study of two types of on-chip FPGA voltage sensors based on ring oscillators (ROs) and time-to-digital converter (TDCs), respectively. It has previously been shown that these sensors are often used to extract side-channel ...
Mitigating Electrical-level Attacks towards Secure Multi-Tenant FPGAs in the Cloud
Special Section on Security in FPGAs and Regular ArticlesA rising trend is the use of multi-tenant FPGAs, particularly in cloud environments, where partial access to the hardware is given to multiple third parties. This leads to new types of attacks in FPGAs, which operate not only on the logic level, but ...
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
AbstractThreshold public-key encryption (threshold PKE) has various useful applications. A lot of threshold PKE schemes are proposed based on RSA, Diffie–Hellman and lattice, but to the best of our knowledge, code-based threshold PKEs have not been ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Himanshu Thapliyal,
- Ronald DeMara,
- Program Chairs:
- Inna Partin-Vaisband,
- Srinivas Katkoori
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Natural Science Foundation of China
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 187Total Downloads
- Downloads (Last 12 months)117
- Downloads (Last 6 weeks)7
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in