Journals
- Anandakumar, N. Nalla, et al. "White Paper-Hardware Security Attack Landscape and Countermeasures." Hardware Security Attack Landscape and Countermeasures (2024): 1-31.
- D. Dobkin, N. Cever, and I. Levi. "RAD-FS: Remote Timing and Power SCA Security in DVFS-augmented Ultra-Low-Power Embedded Systems." ACM Transactions on Embedded Computing Systems (2025).
- Berti, I. Levi. “Providing Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage”. Cryptology ePrint Archive. 2024. (in evaluation).
- Berti, F-X. Standaert, I. Levi. Authenticity in the Presence of Leakage using a Forkcipher. Cryptology ePrint Archive. 2024. (in evaluation).
- D. Dobkin, E. Katz, D. Popovtzer, I. Levi. “EMI Shielding for Use in Side-Channel Security: Analysis, Simulation and Measurements”. Cryptology ePrint Archive. 2024.(in evaluation).
- D. Dobkin, N. Cever and I. Levi, “RAD-FS - Inherent and Embedded SCA-Security in Ultra-Low Power IoTs”, IACR Cryptology ePrint report 2024/186, https://eprint.iacr.org/2024/186, Fab. 2024 (in evaluation).
- E. Cohen, L. Yavits, B. M. Zaidel, A. Fish and I. Levi “CoNfasTT: A Configurable, Scalable and Fast Dual Mode Logic-based NTT Design” IEEE Access 2024 Sep 17.
- Ganon and I. Levi, "CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors." IACR Transactions on Cryptography Hardware and Embedded Systems, T-CHES, 2024
- Katz, I. Levi, "Refined analytical EM model of IC-internal shielding for hardware-security and intra-device simulative framework". IEEE Access, DOI: 10.1109/ACCESS.2024.3363184, Feb 2024.
- Danieli E, Goldzweig M, Avital M, Levi I. "Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF". IEEE Transactions on Information Forensics and Security. 2023 Dec 20. (Final Extended version)
- E. Katz, I. Levi, “An Accurate Analytical Side-Channel Electromagnetic (EM) Model and Inherent Integrated-Circuit (IC) Simulator”. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, TCAD, Jun. 2023.
- D. Salomon and I. Levi, “MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case”. Journal of Cryptographic Engineering, JCEN. 2023 May 29:1-8. (Extended version).
- E. Danieli, M. Goldzweig, M. Avital and I. Levi, "Revealing the Secrets of Radio-Enabled
Embedded Systems: on extraction of raw information from any on-board signal through RF", IACR Cryptology ePrint report 2023/XXX, Apr. 2023.. - M. Avital and I. Levi, "SCMA: Plaintext Classification Assisted Side Channel Spectral Modulation Attacks. Towards Noise-insensitive SCA Attacks...", IACR Cryptology ePrint report 2023/459, Mar. 2023.
- I. Stanger, N. Shavit, R. Taco, M. Lanuzza, L. Yavits, I. Levi and A. Fish, "FlexDML: High Utilization Configurable Multimode Arithmetic Units Featuring Dual Mode Logic", in IEEE Solid-State Circuits Letters (SSC-L). Mar 2023, To appear.
- N. Shalom and I.Levi, "Exploring Multi-Parameter Optimization of Automated High Level Synthesis (HLS) Tools and the Difficulty of Setting Complex Constraints", in IEEE Latin America Symposium on Circuits and Systems, LASCAS, Feb. 2023.
- O. Gur, T. Gross, D. Bellizia, F. -X. Standaert and I. Levi, "An In-Depth Evaluation of Externally Amplified Coupling (EAC) Attacks—A Concrete Threat for Masked Cryptographic Implementations," in IEEE Transactions on Circuits and Systems I: Regular Papers, 2022, doi: 10.1109/TCSI.2022.3222176.
- I. Levi and C. Hazay, "Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . .", IACR Cryptology ePrint report 2022/901.
- R. Breuer, F.X. Standaert and I. Levi, "Fully-Digital Randomization Based Side-Channel Security — Towards Ultra-Low Cost-per-Security", in IEEE Access, vol. 10, pp. 68440-68449, 2022, doi: 10.1109/ACCESS.2022.3185995.
- I. Levi, D. Bellizia and F.X. Standaert, "Tight-ES-TRNG - Improved Construction and Robustness Analysis", Journal of Computer Science, Springer-Nature, DOI 10.1007/s42979-022-01219-5.
- D. Salomon and I. Levi, “On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case”, IACR Cryptology ePrint report 2022/124.
- N. Klein, E. Harel, and I. Levi, “The Cost of a True Random Bit—On the Electronic Cost Gain of ASIC Time-Domain-Based TRNGs”, MDPI Journal of Cryptography 2021, 5(3), 25; 18 Sep 2021
- D. Salomon, A. Weiss, and I. Levi, “Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis”, MDPI Journal of Cryptography 2021, 5(3), 24; 13 Sep 2021
- Y. Weizman, R. Giterman, O. Chertkow, M. Vizentovski, I. Levi, I. Sever, I. Kehati, O. Keren, and A. Fish, "Low-Cost Side-Channel Secure Standard 6T SRAM Based Memory with a 1% Area and less than 5% Latency and Power Overheads" - IEEE Access, vol. 9, pp. 91764-91776, 2021
- R. Breuer and I. Levi, "How Bad Are Bad Templates Optimistic Design Stage Side-Channel Security Evaluation and its Cost", Cryptography 4.4 (2020): 36
- G. Cassiers, B. Grégoire, I. Levi, and F.X. Standaert, "Hardware Private Circuits: From Trivial Composition to Full Verification," IEEE Transactions on Computers, doi: 10.1109/TC.2020.3022979
- I. Levi, D. Bellizia, D. Bol, and F-X. Standaert, "Ask Less Get More: Side-Channel Signal Hiding, Revisited", IEEE Transactions of Circuits And Systems-I (TCAS-I): regular papers, DOI: 10.1109/TCSI.2020.3005338.
- B. Bilgin, L. De Meyer, S. Duval, I. Levi, and F.X. Standaert, "Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking". IACR Transactions on Symmetric Cryptology, pp. 144-184, 2020
- I. Levi, D. Bellizia, and F. X. Standaert. "Beyond Algorithmic Noise. Or How to Shuffle Parallel Implementations?", International Journal of Circuit Theory and Applications, vol. 48, issue 5, pp. 674-695, May 2020
- G. Cassiers, B. Grégoire, I. Levi, and F.X. Standaert, "Hardware Private Circuits: From Trivial Composition to Full Verification". cryptology eprint, 2020
- J. Knechtel, E.B. Kavun, F. Regazzoni, A. Heuser, A. Chattopadhyay, D. Mukhopadhyay, S. Dey, Y. Fei, Y. Belenky, I. Levi and T. Güneysu, "Towards secure composition of integrated circuits and electronic systems: On the role of EDA" . arXiv preprint arXiv:2001.09672, 2020.
- K. Nawaz , L. Van Brandt, I. Levi, F. X. Standaert and D. Flandre, "A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs" in Integration, the VLSI Journal, vol. 68, pp. 71-79, September 2019
- D. Bellizia, F. Berti, O. Bronchain, G. Cassiers, S. Duval, C. Guo, G. Leander, G. Leurent, I. Levi, C. Momin and O. Pereira, "Spook: Sponge-Based Leakage-Resilient Authenticated Encryption with a Masked Tweakable Block Cipher". Submission to NIST Lightweight Cryptography, 2019
- I. Levi, D. Bellizia and F. X. Standaert, "Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations and an Explanation Based on Externally-Amplified Couplings" in IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 293-317, no. 2, Feb. 2019
- R. Taco, I. Levi, M. Lanuzza and A. Fish, "An 88-fJ/40-MHz [0.4 V]–0.61-pJ/1-GHz [0.9 V] Dual-Mode Logic 8 $\times$ 8 bit Multiplier Accumulator With a Self-Adjustment Mechanism in 28-nm FD-SOI," in IEEE Journal of Solid-State Circuits, pp. 560-568, vol. 54, no. 2, Feb. 2019
- I. Levi, A. Fish, and O. Keren. "Low-Cost Pseudoasynchronous Circuit Design Style With Reduced Exploitable Side Information." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26, no. 1 (2018): 82-95.
- R. Giterman, M. Vicentowski, I. Levi, Y. Weizman, O. Keren, and A. Fish. "Leakage Power Attack-Resilient Symmetrical 8T SRAM Cell." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 99 (2018): 1-5.
- K. Nawaz, I. Levi, F. X. Standaert, D. Flandre, "A Transient Noise Analysis of Secured Dual-rail based Logic Style" in Feedback, vol. 1, 2018
- I. Levi, N. Miller, E. Avni, O. Keren, and A. Fish. "A Survey of the Sensitivities of Security Oriented Flip-Flop Circuits." IEEE Access 5 (2017): 24797-24809.
- I. Levi and A. Fish, "Alternative Logic Families for Energy-Efficient and High Performance Chip Design" in Green Photonics and Electronics, pp. 139-172, 2017
- I. Levi, A. Fish, and O. Keren. "CPA secured data-dependent delay-assignment methodology." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25, no. 2 pp. 608-620, 2017
- L. Moyal, I. Levi, A. Teman and A. Fish, "Synthesis of Dual Mode Logic." Integration, the VLSI Journal 55, pp. 246-253, 2016
- R. Taco, I. Levi, A. Fish, and M. Lanuzza, "Low Voltage Logic Circuits Exploiting Gate Level Dynamic Body Biasing in 28 nm UTBB FD-SOI ", Solid State Electronics Journal, Elsevier, vol. 117, pp. 185-192, Mar 2016.
- M. Avital, I. Levi, O. Keren, and A. Fish. "CMOS based gates for blurring power information." IEEE Transactions on Circuits and Systems I: Regular Papers 63, no. 7, pp. 1033-1042, 2016
- V. Youzhaninov, I. Levi and A Fish "Design Flow and Characterization Methodology for Dual Mode Logic”, IEEE Access, vol. 3, pp. 3089-3101, Jan 2016
- I. Levi, O. Keren, and A. Fish, "Data-Dependent Delays as a Barrier Against Power Attacks" IEEE Transactions on circuits and systems – I: Regular Papers, vol.62, no.8, pp. 2069-2078, Aug. 2015
- M. Avital, H. Dagan, I. Levi, O. Keren and A. Fish, “DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes”, IEEE Transactions on circuits and systems – I, vol. 62, issue 1, pp. 149-156, Jan 2015
- I. Levi, A. Albeck, A. Fish, and S. Wimer, “A Low Energy and High Performance DM^2 Adder,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 61, no. 11, pp. 3175–3183, Nov. 2014
- I. Levi, A. Belenky and A. Fish, “Logical Effort for CMOS based Dual Mode Logic (DML) gates”, IEEE Transactions on VLSI systems, vol. 22, issue 5, pp. 1042–1053, May 2014.
- I. Levi and A. Fish, “Dual Mode Logic: Design for Energy Efficiency and High Performance,” IEEE Access, vol. 1, pp. 258–265, 2013
- I. Levi, A. Kaizerman, and A. Fish, “Low voltage dual mode logic: Model analysis and parameter extraction,” Microelectronics Journal, Elsevier, vol. 44, issue 6, pp. 553-560, June 2013
- I. Levi, "Design and Implementation of Energy Efficient Dual Mode Logic", 2013
Conference Proceedings:
- F. Berti, C. Hazay, and I. Levi, “LR-OT: leakage-resilient oblivious transfer”. In International Conference on Security and Cryptography for Networks (SCN) 2024 Sep 10 (pp. 182-204). Cham: Springer Nature Switzerland.
- M. Avital, D. Moscovitz, and I. Levi, "Enhancing EMI-Packaging to Protect against Fault Injection and Side-Channel Attacks". IEEE International Conference on Microwaves, Communications, Antennas, Biomedical Engineering and Electronic Systems (COMCAS) 2024.
- A. Barron, J. Shor, and I. Levi, "Comparative Evaluation of Sensors for Active Adversaries by Laser Fault Injection Detection". IEEE International Conference on Microwaves, Communications, Antennas, Biomedical Engineering and Electronic Systems (COMCAS) 2024.
- F. Berti, C. Hazay, and I. Levi, "State-of-the-Art on Leakage-Resilient Symmetric-Key Cryptography: Outlook, Challenges and Bottlenecks”, IEEE International Conference on Microwaves, Communications, Antennas, Biomedical Engineering and Electronic Systems (COMCAS) 2024.
- E. Danieli, I. Levi, R. Richter, and Y.Richter, "A Taxonomy of Multi-Modal Cyber Radio Frequency (CRF) Mitigation Based on Passive Geo-location and Hardware Sensors", IEEE COMCAS 2024.
- N. Shalom and I. Levi, "Exploring Multi-Parameter Optimization of Automated High Level Synthesis (HLS) Tools and the Difficulty of Setting Complex Constraints", in IEEE Latin America Symposium on Circuits and Systems, LASCAS, Feb. 2023.
- O. Ganon and I. Levi, "Modular and Extensible Processor Architecture As a SW Seamless Playground, with Crypto. Application", IEEE NEWCAS 2023.
- D. Zooker, M. Elkoni, O. Ohev Shalom, Y. Weizman, I. Levi, O. Keren and A. Fish , "Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks" 2020 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-5, Seville, Spain, 2020
- Y. Rudin, I. Levi, A. Fish and O. Keren, "FPGA Implementation of pAsynch Design Paradigm," 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-5, Canary Islands, Spain, 2019
- K. Nawaz, I. Levi, F. X. Standaert, and D. Flandre. "A Transient Noise Analysis of Secured Dual-rail based Logic Style" submitted to New Generation of Circuits and Systems (NGCAS) 2018
- R. Taco, I. Levi, M. Lanuzza and A. Fish, "Energy-delay tradeoffs of low-voltage dual mode logic in 28nm FD-SOI," in 2017 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S),pp. 1-3, Burlingame, CA, 2017
- D. Z. Raviv, I. Levi, A. Fish, and O Keren. "Secured Dual-Rail-Precharge Mux-based (DPMUX) symmetric-logic for low voltage applications." In SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S), 2017 IEEE, pp. 1-2
- M. Haber, I. Levi, Y. Yehoshua, and A. Fish. "Differential input output CMOS (DINO-CMOS)—High performance and energy efficient logic family" in SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S), 2017 IEEE, pp. 1-3
- R. Taco, I. Levi, M. Lanuzza, and A. Fish. "Evaluation of Dual Mode Logic in 28nm FD-SOI technology" in Circuits and Systems (ISCAS), 2017 IEEE International Symposium on, pp. 1-4
- R. Taco, I. Levi, A. Fish, and M. Lanuzza, "Extended Exploration of Low Granularity Back Biasing Control in 28nm UTBB FD-SOI Technology", IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, 2016
- R. Taco, I. Levi, M. Lanuzza, and A. Fish. "Low voltage ripple carry adder with low-granularity dynamic forward back-biasing in 28 nm UTBB FD-SOI" in SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S), 2015 IEEE, pp. 1-2
- R. Taco, I. Levi, A. Fish, and M. Lanuzza, "Back-Biasing in 28nm UTBB FD-SOI sLow voltage Ripple Carry Adder with low-Granularity Dynamic Forward”, IEEE SOI-3D-Subthreshold (S3S), 2015
- B. Frankel, M. Haber, M. Avital, I. Levi, O. Keren and A. Fish, “Practical design-knobs while performing Power Analysis” Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (Trudevice 2015- COST), Grenoble, France, 13 Mar 2015
- R. Taco, I. Levi, A. Fish, and M. Lanuzza, “Exploring back biasing opportunities in 28nm UTBB FD-SOI technology for subthreshold digital design,” Proc. IEEEI 2014, pp. 1–4, Israel, Dec. 2014
- R. Buzilo, B. Likhterov, R. Giterman, I. Levi, A. Fish and A. Belenky, "Approach to integrated energy harvesting voltage source based on novel active TEG array system," 2014 IEEE Faible Tension Faible Consommation, pp. 1-4, Monaco, 2014
- I. Levi, O. Bass, A. Kaizerman, A. Belenky and A. Fish, “High Speed Dual Mode Logic Carry Look Ahead Adder”, Proc. IEEE International Symposium on Circuits and Systems, pp. 3037-3040, Seoul, Korea, May 2012
Books and Book Chapters:
- I. Levi and A. Fish - Dual-Mode-Logic: A New Paradigm for Digital IC Design, Springer (signed), Jan, 2021
- I. Levi and A. Fish - Alternative Logic Families for Energy-Efficient and Fast chip Design, in Eisenstein, G. and Bimberg, D. eds., "Green Photonics and Electronics", Springer International Publishing, 2017
Invited Talks:
- I. Levi “Unique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection”, Embedded Electronic Systems (EmbElec) Seminars Rennes INRIA, France (online), Jun. 2021.
- I. Levi “CAD-compatible SCA security mechanisms and their connection to externally amplified coupling (EAC) attacks on masked designs”, Technology Innovation Institute TII, Crypotography Research Center (CRC), Abu Dhabi (online), Aug. 2021.
- I. Levi, O. Keren and A.Fish “Embedded Randomness and Data Dependancies Design Paradigm: Advantages And Challanges”, Design, Automation and Test in Europe (DATE), Dresden, Germany, March 2018.
- I. Levi, O. Keren and A.Fish “Security Aware Pseudo-Asynchronous Circuit Design Style” to be presented, 2nd International Verification and Security Workshop (IVSW), Greece, July 2017.
- I. Levi, O. Keren, and A. Fish, "CPA Secured Data-Dependent Delay-Assignment Methodology", to be presented, IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore MD, USA, 2017.
- M. Avital, I. Levi, O. Keren, and A. Fish, "CMOS Based Gates for Blurring Power Information", to be presented, IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore MD, USA, 2017.
- I. Levi, O. Keren, and A. Fish, "Hardware Security- New Concepts in Side-Channel-Analysis Immunity", CHIPEX2017, May 2017, Israel.
- I. Levi, O. Keren, and A. Fish, "Data-Dependent Delays as a Barrier Against Power Attacks", IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, 2016.
- M. Avital, I. Levi, O. Keren, and A. Fish, "DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes", in 2016, IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, 2016.
- I. Levi, and A. Fish, "Dual-Mode-Logic", CHIPEX2012, May 2012, Israel.
- R. Taco, I. Levi, A. Fish, and M. Lanuzza, "Live Demo: an 88fJ / 40 MHz [0.4V] – 0.61pJ / 1GHz [0.9V] Dual Mode Logic 8x8-Bit Multiplier Accumulator with a Self-Adjustment Mechanism in 28 nm FD-SOI", has been accepted for a live demonstration at the 2019 IEEE International Symposium on Circuits and Systems (ISCAS), Japan May.
- I. Levi, “Unique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection”, Embedded Electronic Systems (EmbElec) Seminars Rennes INRIA, France (online), Jun. 2021.
- I. Levi, “CAD-compatible SCA security mechanisms and their connection to externally amplified coupling (EAC) attacks on masked designs”, Technology Innovation Institute TII, Cryptography Research Center (CRC), Abu Dhabi (online), Aug. 2021.