You are currently viewing a new version of our website. To view the old version click .

Symmetry and Asymmetry in Hardware Security

This special issue belongs to the section “Computer“.

Special Issue Information

Dear Colleagues,

Hardware security represents one of the most critical frontiers in modern cybersecurity, as the foundational trust in computing systems depends on secure hardware implementations. This Special Issue explores the concept of symmetry and asymmetry in hardware security, examining how symmetric and asymmetric cryptographic paradigms each present unique security challenges and opportunities when implemented in hardware. It also explores how vulnerabilities in the semiconductor supply chain and hardware root of trust impact the end goal of secure silicon and hardware. 

Modern computing systems face multifaceted security challenges at the hardware level, from power-based side-channel leakage that extracts cryptographic keys to hardware trojans embedded during manufacturing. As cryptographic workloads migrate to specialized hardware accelerators and processors incorporate trusted execution environments for sensitive operations, the need for comprehensive hardware security testing and validation has become paramount. Furthermore, the transition toward post-quantum cryptography introduces new hardware implementation challenges, requiring novel countermeasures and verification methodologies.

This Special Issue aims to address these interconnected challenges by consolidating research on defensive and offensive techniques that enhance hardware security across all layers of the computing stack, examining (1) implementation vulnerabilities in hardware cryptographic systems, (2) unified and specialized countermeasures against physical attacks, (3) hardware security testing and verification methodologies, (4) trusted execution environments and hardware security modules, (5) emerging threats from post-quantum cryptographic hardware, (6) hardware trojans and supply-chain security, and (7) machine learning-guided hardware security and root-of-trust.

Original research articles and reviews are welcome. Research areas may include (but are not limited to) the following:

  • Side-channel attacks and defenses (power analysis, timing, electromagnetic);
  • Hardware trojans and malicious circuit modifications;
  • Cryptographic accelerator design and verification;
  • Trusted execution environments and secure enclaves;
  • Post-quantum cryptography hardware implementations;
  • Hardware security testing and validation frameworks;
  • Fault injection attacks and countermeasures;
  • Hardware–software co-design for security.

Dr. Jonti Talukdar
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • side-channel attacks
  • hardware trojans
  • cryptographic accelerators
  • trusted execution environments
  • post-quantum cryptography
  • hardware security testing
  • fault injection attacks
  • power analysis
  • hardware–software co-design
  • hardware security verification

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Published Papers

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Symmetry - ISSN 2073-8994