Search Results - "Aysu, Aydin"
-
1
An Extensive Study of Flexible Design Methods for the Number Theoretic Transform
Published in IEEE transactions on computers (01-11-2022)“…Efficient lattice-based cryptosystems operate with polynomial rings with the Number Theoretic Transform (NTT) to reduce the computational complexity of…”
Get full text
Journal Article -
2
Efficient,Flexible,and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography
Published in IEEE transactions on computers (25-08-2021)“…This paper proposes a discrete Gaussian sampling hardware design that can flexibly support different sampling parameters,that is more efficient (in area-delay…”
Get full text
Journal Article -
3
High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems
Published in IEEE embedded systems letters (01-12-2020)“…Compared to traditional hardware development methodologies, high-level synthesis (HLS) offers a faster time-to-market and lower design-cost at the expense of…”
Get full text
Journal Article -
4
A Full-Stack Approach for Side-Channel Secure ML Hardware
Published in 2023 IEEE International Test Conference (ITC) (07-10-2023)“…Machine learning (ML) has recently emerged as an application with confidentiality needs. A trained ML model is indeed a high-value intellectual property (IP),…”
Get full text
Conference Proceeding -
5
SeqL+: Secure Scan-Obfuscation With Theoretical and Empirical Validation
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-05-2023)“…Scan-obfuscation is a powerful methodology to protect Silicon-based intellectual property from theft. Prior work on scan-obfuscation in the context of…”
Get full text
Journal Article -
6
2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-06-2021)“…Advancements in quantum computing present a security threat to classical cryptography algorithms. Lattice-based key exchange protocols show strong promise due…”
Get full text
Journal Article -
7
Leaking secrets in homomorphic encryption with side-channel attacks
Published in Journal of cryptographic engineering (2024)“…Homomorphic encryption (HE) allows computing encrypted data in the ciphertext domain without knowing the encryption key. It is possible, however, to break…”
Get full text
Journal Article -
8
Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms
Published in IEEE transactions on computers (01-09-2016)“…Energy-harvesting techniques can be combined with wireless embedded sensors to obtain battery-free platforms with an extended lifetime. Although…”
Get full text
Journal Article -
9
Masking FALCON’s Floating-Point Multiplication in Hardware
Published in IACR transactions on cryptographic hardware and embedded systems (05-09-2024)“…Floating-point arithmetic is a cornerstone in a wide array of computational domains, and it recently became a building block for the FALCON post-quantum…”
Get full text
Journal Article -
10
SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs
Published in 2023 IEEE International Symposium on Circuits and Systems (ISCAS) (21-05-2023)“…FPGAs are newly added to the cloud to offer energy-efficient acceleration. Multi-tenancy is an emerging phenomenon in cloud FPGAs to enable resource…”
Get full text
Conference Proceeding -
11
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
Published in IACR transactions on cryptographic hardware and embedded systems (19-11-2021)“…Intellectual Property (IP) thefts of trained machine learning (ML) models through side-channel attacks on inference engines are becoming a major threat…”
Get full text
Journal Article -
12
A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature
Published in 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (06-05-2024)“…Sampling random values from a discrete Gaussian distribution with high precision is a major and computationally-intensive operation of emerging and existing…”
Get full text
Conference Proceeding -
13
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Differential Power Analysis (DPA) has been an active area of research for the past two decades to study the attacks for extracting secret information from…”
Get full text
Conference Proceeding -
14
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks
Published in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05-12-2021)“…This paper proposes the first side-channel attack on FALCON-a NIST Round-3 finalist for the post-quantum digital signature standard. We demonstrate a…”
Get full text
Conference Proceeding -
15
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
Published in 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD) (01-11-2021)“…Stealing trained machine learning (ML) models is a new and growing concern due to the model's development cost. Existing work on ML model extraction either…”
Get full text
Conference Proceeding -
16
A new maskless debiasing method for lightweight physical unclonable functions
Published in 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (01-05-2017)“…An ideal Physical Unclonable Function produces a string of static random bits. Noise causes these bits to be unstable over subsequent readings and biases cause…”
Get full text
Conference Proceeding -
17
BoMaNet: Boolean Masking of an Entire Neural Network
Published in 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD) (02-11-2020)“…Recent work on stealing machine learning (ML) models from inference engines with physical side-channel attacks warrant an urgent need for effective…”
Get full text
Conference Proceeding -
18
Hardware/software co-design of physical unclonable function based authentications on FPGAs
Published in Microprocessors and microsystems (01-10-2015)“…Physical Unclonable Functions (PUFs) enable the generation of device-unique, on-chip, and digital identifiers by exploiting the manufacturing process…”
Get full text
Journal Article -
19
Binary Ring-LWE hardware with power side-channel countermeasures
Published in 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-03-2018)“…We describe the first hardware implementation of a quantum-secure encryption scheme along with its low-cost power side-channel countermeasures. The encryption…”
Get full text
Conference Proceeding -
20
SIMON Says: Break Area Records of Block Ciphers on FPGAs
Published in IEEE embedded systems letters (01-06-2014)“…While advanced encryption standard (AES) is extensively in use in a number of applications, its area cost limits its deployment in resource constrained…”
Get full text
Journal Article