Journal
INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS
Volume 45, Issue 2, Pages 145-169Publisher
WILEY
DOI: 10.1002/cta.2296
Keywords
lightweight crypto-hardware; hash function; public key cryptography; private key cryptography; side channel attack; fault injection attack; random number generator
Categories
Funding
- CSIC [MISAL 201450E034, LACRE 201550E039]
- Spanish Government [CESAR TEC2013-45523-R, INTERVALO TEC2016-80549-R]
Ask authors/readers for more resources
We provide an overview of selected crypto-hardware devices, with a special reference to the lightweight electronic implementation of encryption/decryption schemes, hash functions, and true random number generators. In detail, we discuss the hardware implementation of the chief algorithms used in private-key cryptography, public-key cryptography, and hash functions, discussing some important security issues in electronic crypto-devices, related to side-channel attacks (SCAs), fault injection attacks, and the corresponding design countermeasures that can be taken. Finally, we present an overview about the hardware implementation of true random number generators, discussing the chief electronic sources of randomness and the types of post-processing techniques used to improve the statistical characteristics of the generated random sequences. Copyright (c) 2016 John Wiley & Sons, Ltd.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available