You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 5, Issue 3

September 2021 - 10 articles

Cover Story: With the continuous scaling of CMOS technology, static power begins to dominate the power consumption of nanometer integrated circuits. In recent years, attacks exploiting static power (AESP) have been shown to be really effective in recovering secret keys from nanometer CMOS circuits, therefore representing a serious threat to cryptographic systems. In this work, we analyze the effectiveness of the standard-cell delay-based precharge logic (SC-DDPL) style in counteracting static power side-channel attacks, with experimental results on FPGA implementations. We show that SC-DDPL implementation allows a great improvement of all security metrics not only with respect to standard CMOS implementation, but also with respect to other state-of-the-art countermeasures such as WDDL and MDPL. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (10)

  • Article
  • Open Access
10 Citations
4,837 Views
23 Pages

Random number generators are of paramount importance in numerous fields. Under certain well-defined adversarial settings, True Random Number Generators (TRNGs) are more secure than their computational (pseudo) random number generator counterparts. TR...

  • Article
  • Open Access
6 Citations
4,542 Views
22 Pages

Side-channel analysis (SCA) attacks constantly improve and evolve. Implementations are therefore designed to withstand strong SCA adversaries. Different side channels exhibit varying statistical characteristics of the sensed or exfiltrated leakage, a...

  • Article
  • Open Access
34 Citations
5,735 Views
19 Pages

A Novel Ultra-Compact FPGA PUF: The DD-PUF

  • Riccardo Della Sala,
  • Davide Bellizia and
  • Giuseppe Scotti

In this paper, we present a novel ultra-compact Physical Unclonable Function (PUF) architecture and its FPGA implementation. The proposed Delay Difference PUF (DD-PUF) is the most dense FPGA-compatible PUF ever reported in the literature, allowing th...

  • Article
  • Open Access
4 Citations
3,920 Views
45 Pages

Foundations of Programmable Secure Computation

  • Sven Laur and
  • Pille Pullonen-Raudvere

This paper formalises the security of programmable secure computation focusing on simplifying security proofs of new algorithms for existing computation frameworks. Security of the frameworks is usually well established but the security proofs of the...

  • Article
  • Open Access
7 Citations
4,021 Views
18 Pages

In bioinformatics, genome-wide association studies (GWAS) are used to detect associations between single-nucleotide polymorphisms (SNPs) and phenotypic traits such as diseases. Significant differences in SNP counts between case and control groups can...

  • Article
  • Open Access
6 Citations
3,999 Views
20 Pages

Complementing Privacy and Utility Trade-Off with Self-Organising Maps

  • Kabiru Mohammed,
  • Aladdin Ayesh and
  • Eerke Boiten

In recent years, data-enabled technologies have intensified the rate and scale at which organisations collect and analyse data. Data mining techniques are applied to realise the full potential of large-scale data analysis. These techniques are highly...

  • Article
  • Open Access
11 Citations
5,865 Views
22 Pages

Secure multi-party computation (SMC) is a cryptographic protocol that allows participants to compute the desired output without revealing their inputs. A variety of results related to increasing the efficiency of SMC protocol have been reported, and...

  • Article
  • Open Access
6 Citations
7,693 Views
21 Pages

A Delay-Based Machine Learning Model for DMA Attack Mitigation

  • Yutian Gui,
  • Chaitanya Bhure,
  • Marcus Hughes and
  • Fareena Saqib

Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access and to efficiently use processing power during data transfers between the main system and a peripheral device. However, this advanced feature opens secu...

  • Article
  • Open Access
7 Citations
3,709 Views
22 Pages

This paper shows new card-based cryptographic protocols with the minimum number of rounds, using private operations under the semi-honest model. Physical cards are used in card-based cryptographic protocols instead of computers to achieve secure mult...

  • Article
  • Open Access
4 Citations
4,021 Views
16 Pages

SC-DDPL as a Countermeasure against Static Power Side-Channel Attacks

  • Davide Bellizia,
  • Riccardo Della Sala and
  • Giuseppe Scotti

With the continuous scaling of CMOS technology, which has now reached the 3 nm node at production level, static power begins to dominate the power consumption of nanometer CMOS integrated circuits. A novel class of security attacks to cryptographic c...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X