Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
Belenky, Yaacov, Dushar, Ira, Teper, Valery, Bugaenko, Vadim, Karavaev, Oleg, Azriel, Leonid, Kreimer, Yury
Published in IACR transactions on cryptographic hardware and embedded systems (09.06.2023)
Published in IACR transactions on cryptographic hardware and embedded systems (09.06.2023)
Get full text
Journal Article
Redundancy AES Masking Basis for Attack Mitigation (RAMBAM)
Belenky, Yaacov, Bugaenko, Vadim, Azriel, Leonid, Chernyshchyk, Hennadii, Dushar, Ira, Karavaev, Oleg, Maksimenko, Oleh, Ruda, Yulia, Teper, Valery, Kreimer, Yury
Published in IACR transactions on cryptographic hardware and embedded systems (15.02.2022)
Published in IACR transactions on cryptographic hardware and embedded systems (15.02.2022)
Get full text
Journal Article
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA
Knechtel, Johann, Kavun, Elif Bilge, Regazzoni, Francesco, Heuser, Annelie, Chattopadhyay, Anupam, Mukhopadhyay, Debdeep, Dey, Soumyajit, Fei, Yunsi, Belenky, Yaacov, Levi, Itamar, Guneysu, Tim, Schaumont, Patrick, Polian, Ilia
Published in 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01.03.2020)
Published in 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01.03.2020)
Get full text
Conference Proceeding