A Keccak-Based Wireless Authentication Tag with per-Query Key Update and Power-Glitch Attack Countermeasures
Counterfeiting is a major problem plaguing global supply chains. While small low-cost tagging solutions for supply-chain management exist, security in the face of fault-injection [1] and side-channel attacks [2] remains a concern. Power glitch attacks [3] in particular attempt to leak key-bits by in...
Main Authors: | Juvekar, Chiraag Shashikant (Contributor), Lee, Hyung-Min (Contributor), Kwong, Joyce (Author), Chandrakasan, Anantha P. (Contributor) |
---|---|
Other Authors: | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor) |
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers (IEEE),
2016-02-16T14:23:53Z.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
Hardware and protocols for authentication and secure computation
by: Juvekar, Chiraag (Chiraag Shashikant)
Published: (2018) -
Single-Trace Attacks on Keccak
by: Matthias J. Kannwischer, et al.
Published: (2020-06-01) -
Algebraic Collision Attacks on Keccak
by: Rachelle Heim Boissier, et al.
Published: (2021-03-01) -
New Conditional Cube Attack on Keccak Keyed Modes
by: Zheng Li, et al.
Published: (2019-06-01) -
Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures
by: Ting Li, et al.
Published: (2017-12-01)