- Physical Unclonable Functions (PUFs) and Hardware Security
- Cryptographic Implementations and Security
- Advanced Malware Detection Techniques
- Chaos-based Image/Signal Encryption
- Radiation Effects in Electronics
Tokyo Institute of Technology
2022-2024
With the growth of Internet Things (IoT) era, protection secret information on IoT devices is becoming increasingly important. For devices, attacks that target leakage through physical side-channels (e.g., a power side-channel) are major threat in many use cases because can be accessed easily by hostile third party. However, securing resource-constrained against side-channel challenging issue. Generally, it difficult to satisfy requirements while maintaining low-power and real-time...
In the Internet of Things (IoT) era, edge devices have been considerably diversified and are often designed using high-level synthesis (HLS) for improved design productivity. However, HLS tools were originally developed in a security-unaware manner, resulting vulnerabilities to power side-channel attacks (PSCAs), which serious threat IoT systems. Currently, impact applicability existing methods PSCA-resistant designs limited. this article, we propose an effective HLS-based method ciphers...
In this paper, four different versions of FPGA-based hardware implementation for Chaskey-12, a lightweight message authentication code algorithm suitable resource-constrained devices, were generated using high-level synthesis (HLS) with optimizations memory and operation parallelization to examine the effects not only on circuit area execution time but also vulnerability power side-channel attacks. Through evaluation Welch's t-test, we disclosed how each optimization would contribute...
In the era of Internet Things (IoT), edge devices are considerably diversified and often designed using high-level synthesis (HLS) to improve design-productivity. A problem here is that HLS tools were originally developed in a security-unaware fashion, inducing vulnerabilities power side-channel attacks (PSCA), which serious threat IoT. Although PSCA induced by recently started be discussed, effects applicability existing methods for PSCA-resistant designs limited so far. this paper, we...