2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2021
DOI: 10.1109/host49136.2021.9702282
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Encryption Using Chaffing and Winnowing with All-or-Nothing Transform for Network-on-Chip Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Charles et al [23] talks about snooping attack when NoC is malicious which uses similar threat model as [7] with the exception of not using covert channels. Similar threat models are explored in [71,82] where there is a malicious router snooping packets inside NoC. Hussain and Guo [44] also talks about packet leaks in NoC where the NoC is a third-party IP.…”
Section: Electrical Linksmentioning
confidence: 95%
See 1 more Smart Citation
“…Charles et al [23] talks about snooping attack when NoC is malicious which uses similar threat model as [7] with the exception of not using covert channels. Similar threat models are explored in [71,82] where there is a malicious router snooping packets inside NoC. Hussain and Guo [44] also talks about packet leaks in NoC where the NoC is a third-party IP.…”
Section: Electrical Linksmentioning
confidence: 95%
“…They use encryption of initialization vector and counter to generate unique key for encryption. A lightweight encryption scheme that utilizes two basic concepts of chaffing and winnowing [66] and all-or-nothing transform [65] is proposed by Weerasena et al [82]. All-ornothing transform has a lightweight quasi-group based implementation.…”
Section: Confidentialitymentioning
confidence: 99%