


default search action
HOST 2010: Anaheim, CA, USA
- Jim Plusquellic, Ken Mai:

HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, USA. IEEE Computer Society 2010, ISBN 978-1-4244-7810-1
Session 1: Attacks
- Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament:

Entropy-based Power Attack. 1-6 - Alessandro Barenghi

, Guido Bertoni
, Luca Breveglieri
, Mauro Pellicioli, Gerardo Pelosi
:
Low Voltage Fault Attacks to AES. 7-12 - Seetharam Narasimhan, Rajat Subhra Chakraborty, Dongdong Du, Somnath Paul, Francis G. Wolff, Christos A. Papachristou

, Kaushik Roy, Swarup Bhunia
:
Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach. 13-18
Session 2: Industrial
- Christopher J. Clark:

Anti-tamper JTAG TAP Design Enables DRM to JTAG Registers and P1687 on-chip Instruments. 19-24 - Bruce Newgard, Colby Hoffman:

Using Multiple Processors in a Single Reconfigurable Fabric for High-assurance Applications. 25-29
Session 3: Watermarking
- Georg T. Becker, Markus Kasper, Amir Moradi

, Christof Paar:
Side-channel based Watermarks for Integrated Circuits. 30-35 - Daniel Ziener

, Florian Baueregger, Jürgen Teich:
Multiplexing Methods for Power Watermarking. 36-41 - Farinaz Koushanfar

, Yousra Alkabani:
Provably Secure Obfuscation of Diverse Watermarks for Sequential Circuits. 42-47
Poster Session
- Xinxin Fan, Guang Gong, Ken Lauffenburger, Troy Hicks:

FPGA Implementations of the Hummingbird Cryptographic Algorithm. 48-51 - Kazuyuki Tanimura, Nikil D. Dutt

:
ExCCel: Exploration of Complementary Cells for Efficient DPA Attack Resistivity. 52-55 - Mainak Banga, Michael S. Hsiao:

Trusted RTL: Trojan Detection Methodology in Pre-silicon Designs. 56-59 - Kazuyuki Kobayashi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta, Miroslav Knezevic, Ünal Koçabas, Junfeng Fan, Ingrid Verbauwhede

, Eric Xu Guo, Shin'ichiro Matsuo, Sinan Huang, Leyla Nazhandali, Akashi Satoh:
Prototyping Platform for Performance Evaluation of SHA-3 Candidates. 60-63 - Eric Menendez, Ken Mai

:
A Comparison of Power-analysis-resistant Digital Circuits. 64-69 - Jeyavijayan Rajendran, Hetal Borad, Shyam Mantravadi, Ramesh Karri

:
SLICED: Slide-based Concurrent Error Detection Technique for Symmetric Block Ciphers. 70-75
Session 4: Elliptic Curve Cryptography
- Junfeng Fan, Xu Guo, Elke De Mulder, Patrick Schaumont

, Bart Preneel
, Ingrid Verbauwhede
:
State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures. 76-87 - Johann Heyszl, Frederic Stumpf:

Efficient One-pass Entity Authentication based on ECC for Constrained Devices. 88-93
Session 5: Physical Unclonable Functions
- Abhranil Maiti, Jeff Casarona, Luke McHale, Patrick Schaumont

:
A Large Scale Characterization of RO-PUF. 94-99 - Chi-En Daniel Yin, Gang Qu:

LISA: Maximizing RO PUF's Secret Extraction. 100-105 - Mudit Bhargava, Cagla Cakir, Ken Mai:

Attack Resistant Sense Amplifier based PUFs (SA-PUF) with Deterministic and Controllable Reliability of PUF Responses. 106-111 - Kurt Rosenfeld, Efstratios Gavas, Ramesh Karri

:
Sensor Physical Unclonable Functions. 112-117
Session 6: Implementations and Countermeasures
- Ekarat Laohavaleeson, Chintan Patel:

Current Flattening Circuit for DPA Countermeasure. 118-123 - Craig Teegarden, Mudit Bhargava, Ken Mai

:
Side-channel Attack Resistant ROM-based AES S-Box. 124-129 - Akashi Satoh, Toshihiro Katashita

, Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki:
Hardware Implementations of Hash Function Luffa. 130-134 - Vikram B. Suresh, Wayne P. Burleson:

Entropy Extraction in Metastability-based TRNG. 135-140

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














