{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:00:50Z","timestamp":1756310450381,"version":"3.41.0"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JST AIP Acceleration Research","award":["JPMJCR20U2"],"award-info":[{"award-number":["JPMJCR20U2"]}]},{"name":"JST FOREST Program","award":["JPMJFR216P"],"award-info":[{"award-number":["JPMJFR216P"]}]},{"name":"JSPS KAKENHI","award":["JP20H00590"],"award-info":[{"award-number":["JP20H00590"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>In the Internet of Things (IoT) era, edge devices have been considerably diversified and are often designed using high-level synthesis (HLS) for improved design productivity. However, HLS tools were originally developed in a security-unaware manner, resulting in vulnerabilities to power side-channel attacks (PSCAs), which are a serious threat to IoT systems. Currently, the impact and applicability of existing methods to PSCA-resistant designs using HLS are limited. In this article, we propose an effective HLS-based design method for PSCA-resistant ciphers implemented in hardware. In particular, we focus on lightweight block ciphers composed of addition\/rotation\/XOR (ARX)-based permutations to study the effects of the threshold implementation (which is one of the provably secure countermeasures against PSCAs) to the behavioral descriptions of ciphers along with the changes in HLS scheduling. The results obtained using Welch\u2019s t-test demonstrate that our proposed method can successfully improve the resistance against PSCAs for all ARX-based ciphers used as benchmarks.<\/jats:p>","DOI":"10.1145\/3609507","type":"journal-article","created":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T11:58:07Z","timestamp":1689595087000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Power Side-channel Attack Resistant Circuit Designs of ARX Ciphers Using High-level Synthesis"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4727-3906","authenticated-orcid":false,"given":"Saya","family":"Inagaki","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3722-7009","authenticated-orcid":false,"given":"Mingyu","family":"Yang","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0219-5289","authenticated-orcid":false,"given":"Yang","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4414-815X","authenticated-orcid":false,"given":"Kazuo","family":"Sakiyama","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9486-5272","authenticated-orcid":false,"given":"Yuko","family":"Hara-Azumi","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"issue":"5","key":"e_1_3_2_2_2","article-title":"Boolean masking for arithmetic additions at arbitrary order in hardware","volume":"12","author":"Bache Florian","year":"2022","unstructured":"Florian Bache and Tim G\u00fcneysu. 2022. Boolean masking for arithmetic additions at arbitrary order in hardware. Applied Sciences 12, 5 (2022).","journal-title":"Applied Sciences"},{"key":"e_1_3_2_3_2","first-page":"116","volume-title":"Proceedings of the Conference on Computer and Communications Security","author":"Barthe Gilles","year":"2016","unstructured":"Gilles Barthe, Sonia Bela\u00efd, Fran\u00e7ois Dupressoir, Pierre-Alain Fouque, Benjamin Gr\u00e9goire, Pierre-Yves Strub, and R\u00e9becca Zucchini. 2016. Strong non-interference and type-directed higher-order masking. In Proceedings of the Conference on Computer and Communications Security. 116\u2013129."},{"key":"e_1_3_2_4_2","first-page":"1","volume-title":"Proceedings of the Design Automation Conference","author":"Beaulieu Ray","year":"2015","unstructured":"Ray Beaulieu, Stefan Treatman-Clark, Douglas Shors, Bryan Weeks, Jason Smith, and Louis Wingers. 2015. The SIMON and SPECK lightweight block ciphers. In Proceedings of the Design Automation Conference. 1\u20136."},{"key":"e_1_3_2_5_2","first-page":"326","volume-title":"Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security","author":"Bilgin Beg\u00fcl","year":"2014","unstructured":"Beg\u00fcl Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. 2014. Higher-order threshold implementations. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. 326\u2013343."},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-030-36237-9_8","volume-title":"Proceedings of the Algebra, Codes, and Cryptology","author":"Bruneau Nicolas","year":"2019","unstructured":"Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, and Sylvain Guilley. 2019. Security evaluation against side-channel analysis at compilation time. In Proceedings of the Algebra, Codes, and Cryptology. 129\u2013148."},{"key":"e_1_3_2_7_2","first-page":"246","volume-title":"Proceedings of the International Conference on Cryptology in India","author":"Caforio Andrea","year":"2021","unstructured":"Andrea Caforio, Daniel Collins, Ognjen Glamo\u010danin, and Subhadeep Banik. 2021. Improving first-order threshold implementations of skinny. In Proceedings of the International Conference on Cryptology in India. 246\u2013267."},{"key":"e_1_3_2_8_2","first-page":"193","volume-title":"Proceedings of the International Conference on Field-Programmable Logic and Applications","author":"Coleman Flora","year":"2020","unstructured":"Flora Coleman, Behnaz Rezvani, Sachin Sachin, and Williams Diehl. 2020. Side channel resistance at a cost: A comparison of arx-based authenticated encryption. In Proceedings of the International Conference on Field-Programmable Logic and Applications. 193\u2013199."},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.123-148"},{"key":"e_1_3_2_10_2","first-page":"128","volume-title":"Proceedings of the International Conference on Field Programmable Technology","author":"Diehl William","year":"2017","unstructured":"William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, and Kris Gaj. 2017. Comparing the cost of protecting selected lightweight block ciphers against differential power analysis in low-cost FPGAs. In Proceedings of the International Conference on Field Programmable Technology. 128\u2013135."},{"key":"e_1_3_2_11_2","first-page":"2050","volume-title":"Proceedings of the International Symposium on Circuits and Systems","author":"Dofe Jaya","year":"2016","unstructured":"Jaya Dofe, Jonathan Frey, and Qiaoyan Yu. 2016. Hardware security assurance in emerging IoT applications. In Proceedings of the International Symposium on Circuits and Systems. 2050\u20132053."},{"key":"e_1_3_2_12_2","first-page":"1","volume-title":"Proceedings of the High Performance Extreme Computing Conference","author":"Ehret Alan","year":"2019","unstructured":"Alan Ehret, Karen Gettings, Bruce R. Jordan, and Michel A. Kinsy. 2019. A Survey on hardware security techniques targeting Low-Power SoC designs. In Proceedings of the High Performance Extreme Computing Conference. 1\u20138."},{"key":"e_1_3_2_13_2","first-page":"384","volume-title":"Proceedings of the International Conference on Cryptology in India","author":"Ghoshal Ashrujit","year":"2017","unstructured":"Ashrujit Ghoshal and Thomas De Cnudde. 2017. Several masked implementations of the boyar-peralta AES S-box. In Proceedings of the International Conference on Cryptology in India. 384\u2013402."},{"key":"e_1_3_2_14_2","first-page":"657","volume-title":"Proceedings of the Global Conference on Consumer Electronics","author":"Hori Yohei","year":"2012","unstructured":"Yohei Hori, Toshihiro Katashita, Akihiko Sasaki, and Akashi Satoh. 2012. SASEBO-GIII: A hardware security evaluation board equipped with a 28-nm FPGA. In Proceedings of the Global Conference on Consumer Electronics. 657\u2013660."},{"key":"e_1_3_2_15_2","first-page":"1","volume-title":"Proceedings of the International Symposium on Quality Electronic Design","author":"Inagaki Saya","year":"2022","unstructured":"Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, and Yuko Hara-Azumi. 2022. Examining vulnerability of hls-designed chaskey-12 circuits to power side-channel attacks. In Proceedings of the International Symposium on Quality Electronic Design. 1\u20131."},{"issue":"3","key":"e_1_3_2_16_2","doi-asserted-by":"crossref","first-page":"627","DOI":"10.46586\/tches.v2018.i3.627-653","article-title":"Efficient side-channel protections of ARX ciphers","volume":"2018","author":"Jungk Bernhard","year":"2018","unstructured":"Bernhard Jungk, Richard Petri, and Marc St\u00f6ttinger. 2018. Efficient side-channel protections of ARX ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems 2018, 3 (2018), 627\u2013653.","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"issue":"8","key":"e_1_3_2_17_2","doi-asserted-by":"crossref","first-page":"786","DOI":"10.1109\/TC.1973.5009159","article-title":"A parallel algorithm for the efficient solution of a general class of recurrence equations","volume":"22","author":"Kogge Peter M.","year":"1973","unstructured":"Peter M. Kogge and Harold S. Stone. 1973. A parallel algorithm for the efficient solution of a general class of recurrence equations. IEEE Transactions on Computers C-22, 8 (1973), 786\u2013793.","journal-title":"IEEE Transactions on Computers"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2022.3215670"},{"key":"e_1_3_2_19_2","first-page":"269","volume-title":"Proceedings of the International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation","author":"Mentens Nele","year":"2017","unstructured":"Nele Mentens. 2017. Hiding side-channel leakage through hardware randomization: a comprehensive overview. In Proceedings of the International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation. 269\u2013272."},{"key":"e_1_3_2_20_2","first-page":"89","volume-title":"Proceedings of the International Symposium on Hardware-Oriented Security and Trust","author":"Moradi Amir","year":"2012","unstructured":"Amir Moradi and Oliver Mischke. 2012. Glitch-free implementation of masking in modern FPGAs. In Proceedings of the International Symposium on Hardware-Oriented Security and Trust. 89\u201395."},{"key":"e_1_3_2_21_2","volume-title":"Chaskey: A MAC Algorithm for Microcontrollers \u2013 Status Update and Proposal of Chaskey-12 \u2013","author":"Mouha Nicky","year":"2015","unstructured":"Nicky Mouha. 2015. Chaskey: A MAC Algorithm for Microcontrollers \u2013 Status Update and Proposal of Chaskey-12 \u2013. Ph. D. Dissertation. Inria Paris Rocquencourt."},{"key":"e_1_3_2_22_2","first-page":"306","volume-title":"Proceedings of the International Conference on Selected Areas in Cryptography","author":"Mouha Nicky","year":"2014","unstructured":"Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. 2014. Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. In Proceedings of the International Conference on Selected Areas in Cryptography. 306\u2013323."},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/11935308_38","volume-title":"Proceedings of the International Conference on Information and Communications Security","author":"Nikova Svetla","year":"2006","unstructured":"Svetla Nikova, Christian Rechberger, and Vincent Rijmen. 2006. Threshold implementations against side-channel attacks and glitches. In Proceedings of the International Conference on Information and Communications Security. 529\u2013545."},{"issue":"3","key":"e_1_3_2_24_2","first-page":"22","article-title":"Analyzing security vulnerabilities induced by high-level synthesis","volume":"18","author":"Pundir Nitin","year":"2022","unstructured":"Nitin Pundir, Sohrab Aftabjahani, Rosario Cammarota, Mark Tehranipoor, and Farimah Farahmandi. 2022. Analyzing security vulnerabilities induced by high-level synthesis. ACM Journal on Emerging Technologies in Computing Systems 18, 3(2022), 22 pages.","journal-title":"ACM Journal on Emerging Technologies in Computing Systems"},{"key":"e_1_3_2_25_2","first-page":"764","volume-title":"Proceedings of the Annual International Cryptology Conference","author":"Reparaz Oscar","year":"2015","unstructured":"Oscar Reparaz, Beg\u00fcl Bilgin, Svetla Nikova, Benedikt Gierlichs, and Ingrid Verbauwhede. 2015. Consolidating masking schemes. In Proceedings of the Annual International Cryptology Conference. 764\u2013783."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2875746"},{"key":"e_1_3_2_27_2","first-page":"223","volume-title":"Proceedings of the Design Automation Conference","author":"Sadhukhan Rajat","year":"2021","unstructured":"Rajat Sadhukhan, Sayandeep Saha, and Debdeep Mukhopadhyay. 2021. Shortest path to secured hardware: domain oriented masking with high-level-synthesis. In Proceedings of the Design Automation Conference. 223\u2013228."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0120-y"},{"key":"e_1_3_2_29_2","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/978-3-319-28166-7_27","volume-title":"Proceedings of the Applied Cryptography and Network Security","author":"Schneider Tobias","year":"2015","unstructured":"Tobias Schneider, Amir Moradi, and Tim G\u00fcneysu. 2015. Arithmetic addition over boolean masking. In Proceedings of the Applied Cryptography and Network Security. Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, and Michalis Polychronakis (Eds.), 559\u2013578."},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2021.104311"},{"issue":"1","key":"e_1_3_2_31_2","first-page":"123","article-title":"3-share threshold implementation of aes s-box without fresh randomness","volume":"2019","author":"Sugawara Takeshi","year":"2019","unstructured":"Takeshi Sugawara. 2019. 3-share threshold implementation of aes s-box without fresh randomness. IACR Transactions on Cryptographic Hardware and Embedded Systems 2019, 1 (2019), 123\u2013145.","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100564"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2950380"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609507","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3609507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:24Z","timestamp":1750178784000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609507"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3609507"],"URL":"https:\/\/doi.org\/10.1145\/3609507","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2023,9,26]]},"assertion":[{"value":"2023-01-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}