Electronic Science and Technology ›› 2023, Vol. 36 ›› Issue (9): 15-20.doi: 10.16180/j.cnki.issn1007-7820.2023.09.003
Previous Articles Next Articles
LIU Wei,ZENG Xiangyi,XIAO Hao
Received:
2022-04-01
Online:
2023-09-15
Published:
2023-09-18
Supported by:
CLC Number:
LIU Wei,ZENG Xiangyi,XIAO Hao. Design of SoC Secure Memory Based on Lightweight Block Cipher[J].Electronic Science and Technology, 2023, 36(9): 15-20.
[1] | Won Y S, Bhasin S. Are cold boot attacks still feasible: A case study on raspberry Pi with stacked memory[C]. Milan: Proceedings of the Eighteenth Workshop on Fault Detection and Tolerance in Cryptography, 2021: 56-60. |
[2] | Anagnostopoulos N A, Arul T, Rosenstihl M, et al. Low-temperature data remanence attacks against intrinsic SRAM PUFs[C]. Prague: Proceedings of the Twenty-first Euromicro Conference on Digital System Design, 2018: 581-585. |
[3] | Skorobogatov S. Local heating attacks on flash memory devices[C]. San Francisco: IEEE International Workshop on Hardware-Oriented Security and Trust, 2009:1-6. |
[4] | 张翌维, 邬可可, 陈佳佩. 一种抵御侵入式分析的密码芯片存储总线[J]. 小型微型计算机系统, 2012, 33(4):785-788. |
Zhang Yiwei, Wu Keke, Chen Jiapei. Security chip memory bus for resisting invasive analysis[J]. Journal of Chinese Computer Systems, 2012, 33(4):785-788. | |
[5] | Samyde D, Skorobogatov S, Anderson R. et al. On a new way to read data from memory[C]. Greenbelt: Proceedings of the First International IEEE Security in Storage Workshop, 2003:65-69. |
[6] | 黄小苑, 戴紫彬. 基于FPGA的AES算法芯片设计实现[J]. 微电子学与计算机, 2005(8):62-4. |
Huang Xiaoyuan, Dai Zibin. Design on FPGA implementation of AES algorithm chip[J]. Microelectronics and Computer, 2005(8):62-64. | |
[7] | 刘根贤, 王海霞, 刘振宇, 等. 嵌入式处理器片外访存加密机制设计与实现[J]. 计算机工程与应用, 2014, 50(22):92-96. |
Liu Genxian, Wang Haixia, Liu Zhenyu, et al. Encryption scheme design and implementation of embedded processor off-chip memory access[J]. Computer Engineering and Applications, 2014, 50(22):92-6. | |
[8] | 麦涛涛, 潘晓中, 苏阳. 基于KLEIN密码的存储器加密技术[J]. 武汉大学学报(理学版), 2016, 62(2):171-176. |
Mai Taotao, Pan Xiaozhong, Su Yang. Storage encryption technology based on KLEIN cipher[J]. Journal of Wuhan University(Natural Science Edition), 2016, 62(2):171-176. | |
[9] | Peterson P A H. Cryptkeeper: Improving security with encrypted RAM[C]. Waltham: Proceedings of the IEEE International Conference on Technologies for Homeland Security, 2010:120-126. |
[10] | Werner M, Unterluggauer T, Schilling R, et al. Transparent memory encryption and authentication[C]. Ghent: Proceedings of the Twenty-seventh International Conference on Field Programmable Logic and Applications, 2017:1-6. |
[11] | 何卫国, 黄金金, 李军, 等. 一种Flash安全存储控制器的设计与实现[J]. 通信技术, 2020, 53(5):1300-1303. |
He Weiguo, Huang Jinjin, Li Jun, et al. Design and implementation of Flash safe storage controller[J]. Communications Technology, 2020, 53(5):1300-1303. | |
[12] | Mahantesh R S, Mohapatra S. Design of secured block ciphers present and hight algorithms and its FPGA implementation[C]. Madurai: Proceedings of the Second International Conference on Intelligent Computing and Control Systems, 2018:1113-1118. |
[13] | Mhaouch A, Elhamzi W, Atri M. Lightweight hardware architectures for the piccolo block cipher in FPGA[C]. Sousse: Proceedings of the Fifth International Conference on Advanced Technologies for Signal and Image Processing, 2020:1-4. |
[14] | Wu W L, Zhang L. LBlock: A lightweight block cipher[C]. Malaga: Proceedings of the Ninth International Conference on Applied Cryptography and Network Security, 2011:327-344. |
[15] | 张溪. LAC认证加密算法的研究与分析[D]. 西安: beoplay体育提现, 2017:17-19. |
Zhang Xi. Research and analysis of LAC authentication encryption algorithm[D]. Xi'an: Xidian University, 2017:17-19. | |
[16] |
Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991, 4(1):3-72.
doi: 10.1007/BF00630563 |
[17] | Shan J Y, Hu L, Sun S W. Security of LBlock-s against related-key differential attack[C]. Coimbatore: Proceedings of the Second International Conference on Electronics and Communication Systems, 2015:1278-1283. |
[18] | 曾小波, 唐忠彪, 焦歆. 基于单片机的SM3算法优化及Verilog模型验证[J]. 电子科技, 2015, 28(2):38-40. |
Zeng Xiaobo, Tang Zhongbiao, Jiao Xin. Optimization of SM3 algorithm and verilog model validation based on SCM[J]. Electronic Science and Technology, 2015, 28(2): 38-40. |
[1] | CAO Hongfang,WANG Xiaolei,DU Gaoming,LI Zhenmin,NI Wei. Design and FPGA Implementation of Dehazing Based on Channel Difference Model and Guided Filtering [J]. Electronic Science and Technology, 2023, 36(8): 1-6. |
[2] | WANG Xiaolei,DAI Wujun,DU Gaoming,LI Zhenmin,ZHANG Duoli. Design of a High-Performance SC Decoder for Polar Codes [J]. Electronic Science and Technology, 2022, 35(8): 14-20. |
[3] | CHENG Biqian,LIU Guangzhu,XIAO Hao. Improved Montgomery Modular Multiplication Algorithm and FPGA Implementation [J]. Electronic Science and Technology, 2022, 35(7): 58-63. |
[4] | WANG Chunhua,LI Bin,DU Gaoming,LI Zhenmin. Design and Implement of a High-Performance RLWE Cryptoprocessor [J]. Electronic Science and Technology, 2022, 35(11): 13-20. |
[5] | JIN Xin,FENG Yi,YOU Xuexi,WANG Jiaxin. Research on Information Security Equipment Deployment Guarantee Technology [J]. Electronic Science and Technology, 2020, 33(8): 80-86. |
[6] | LIU Chen,MA Sijun,NI Xueli. Attribute-Based Access Control for the Perception Layer of The Internet of Things [J]. Electronic Science and Technology, 2019, 32(9): 55-59. |
[7] | GAO Yang,HAN Ren,WANG Qingyun. Spectrum Allocation with Multi-Objective Optimization based on Immune Algorithm in Cognitive Radio Networks [J]. Electronic Science and Technology, 2019, 32(4): 54-59. |
[8] | ZHA Hongze. Research on Information Security Evaluation Algorithm Based on Hierarchical Protection [J]. Electronic Science and Technology, 2019, 32(11): 78-82. |
[9] | WAN Yi,ZHU Zhixiang,WU Chen,MA Wen. An Android Application Protection Method Based on Data Encryption Technology [J]. , 2016, 29(2): 173-. |
[10] | FAN Wenjing1, WANG Zhaoli2, WANG Huijuan1, FEI Jufeng2, LI Xiaoxiao1. Implementation of Lossless Image Compression Algorithm Based on FPGA [J]. , 2016, 29(11): 126-. |
[11] | XU Zhi. A Spectrum Feature Based Algorithm for Hiding Information in Digital Audio [J]. , 2015, 28(8): 84-. |
[12] | QIAO Ping'an,SHAO Kai,LIU Yunshuang. Research on Multi-path Multi-channel Routing Metrics in Wireless Ad Hoc Networks [J]. , 2015, 28(8): 60-. |
[13] | ZHOU Sheng,ZHAO Junyi,GE Yuanpeng. Construction of a Combination of Active and Passive Defense of Smart Grid Information Security System [J]. , 2015, 28(6): 213-. |
[14] | YE Mingjie. An Improved Topology Control Algorithm in Cognitive Radio Networks [J]. , 2015, 28(5): 13-. |
[15] | WANG Yue. Study on the Blocking Problem of Improved PCMA Protocol [J]. , 2014, 27(4): 16-. |
|