Publications

Journals

  1. Dobkin, N. Cever and I. Levi, “RAD-FS - Inherent and Embedded SCA-Security in Ultra-Low Power IoTs”, IACR Cryptology ePrint report 2024/186, https://eprint.iacr.org/2024/186, Fab. 2024 (in evaluation).
  2. O. Ganon and I. Levi, "CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors." Cryptology ePrint Archive (2024). (in submission T-CHES 2nd 2024)
  3. Katz, I. Levi, "Refined analytical EM model of IC-internal shielding for hardware-security and intra-device simulative framework". IEEE Access, DOI: 10.1109/ACCESS.2024.3363184, Feb 2024.
  4. Danieli E, Goldzweig M, Avital M, Levi I. "Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF". IEEE Transactions on Information Forensics and Security. 2023 Dec 20. (Final Extended version)
  5. E. Katz, I. Levi, “An Accurate Analytical Side-Channel Electromagnetic (EM) Model and Inherent Integrated-Circuit (IC) Simulator”. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, TCAD, Jun. 2023.
  6. D. Salomon and I. Levi, “MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case”. Journal of Cryptographic Engineering, JCEN. 2023 May 29:1-8. (Extended version).
  7. E. Danieli, M. Goldzweig, M. Avital and I. Levi, "Revealing the Secrets of Radio-Enabled
    Embedded Systems: on extraction of raw information from any on-board signal through RF", IACR Cryptology ePrint report 2023/XXX, Apr. 2023..
  8. M. Avital and I. Levi, "SCMA: Plaintext Classification Assisted Side Channel Spectral Modulation Attacks. Towards Noise-insensitive SCA Attacks...", IACR Cryptology ePrint report 2023/459, Mar. 2023.
  9. I. Stanger, N. Shavit, R. Taco, M. Lanuzza, L. Yavits, I. Levi and A. Fish, "FlexDML: High Utilization Configurable Multimode Arithmetic Units Featuring Dual Mode Logic", in IEEE Solid-State Circuits Letters (SSC-L). Mar 2023, To appear.
  10. N. Shalom and I.Levi, "Exploring Multi-Parameter Optimization of Automated High Level Synthesis (HLS) Tools and the Difficulty of Setting Complex Constraints", in IEEE Latin America Symposium on Circuits and Systems, LASCAS, Feb. 2023.
  11. O. Gur, T. Gross, D. Bellizia, F. -X. Standaert and I. Levi, "An In-Depth Evaluation of Externally Amplified Coupling (EAC) Attacks—A Concrete Threat for Masked Cryptographic Implementations," in IEEE Transactions on Circuits and Systems I: Regular Papers, 2022, doi: 10.1109/TCSI.2022.3222176.
  12. I. Levi and C. Hazay, "Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . .", IACR Cryptology ePrint report 2022/901.
  13. R. Breuer, F.X. Standaert and I. Levi, "Fully-Digital Randomization Based Side-Channel Security — Towards Ultra-Low Cost-per-Security", in IEEE Access, vol. 10, pp. 68440-68449, 2022, doi: 10.1109/ACCESS.2022.3185995.
  14. I. Levi, D. Bellizia and F.X. Standaert, "Tight-ES-TRNG - Improved Construction and Robustness Analysis", Journal of Computer Science, Springer-Nature,  DOI 10.1007/s42979-022-01219-5.
  15. D. Salomon and I. Levi, “On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case”, IACR Cryptology ePrint report 2022/124.
  16. N. Klein, E. Harel, and I. Levi, “The Cost of a True Random Bit—On the Electronic Cost Gain of ASIC Time-Domain-Based TRNGs”, MDPI Journal of Cryptography 2021, 5(3), 25;  18 Sep 2021
  17. D. Salomon, A. Weiss, and I. Levi, “Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis”, MDPI Journal of Cryptography 2021, 5(3), 24; 13 Sep 2021
  18. Y. Weizman, R. Giterman, O. Chertkow, M. Vizentovski, I. Levi, I. Sever, I. Kehati, O. Keren, and A. Fish,  "Low-Cost Side-Channel Secure Standard 6T SRAM Based Memory with a 1% Area and less than 5% Latency and Power Overheads" - IEEE Access, vol. 9, pp. 91764-91776, 2021
  19. R. Breuer and I. Levi, "How Bad Are Bad Templates Optimistic Design Stage Side-Channel Security Evaluation and its Cost", Cryptography 4.4 (2020): 36
  20. G. Cassiers, B. Grégoire, I. Levi, and F.X. Standaert, "Hardware Private Circuits: From Trivial Composition to Full Verification," IEEE Transactions on Computers, doi: 10.1109/TC.2020.3022979
  21. I. Levi, D. Bellizia, D. Bol, and F-X. Standaert, "Ask Less Get More: Side-Channel Signal Hiding, Revisited", IEEE Transactions of Circuits And Systems-I (TCAS-I): regular papers, DOI: 10.1109/TCSI.2020.3005338.
  22. B. Bilgin, L. De Meyer, S. Duval, I. Levi,  and F.X. Standaert, "Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking". IACR Transactions on Symmetric Cryptology, pp. 144-184, 2020
  23. I. Levi, D. Bellizia, and F. X. Standaert. "Beyond Algorithmic Noise. Or How to Shuffle Parallel Implementations?", International Journal of Circuit Theory and Applications, vol. 48, issue 5, pp. 674-695, May 2020
  24. G. Cassiers, B. Grégoire, I. Levi, and F.X. Standaert, "Hardware Private Circuits: From Trivial Composition to Full Verification". cryptology eprint, 2020
  25. J. Knechtel, E.B. Kavun, F. Regazzoni, A. Heuser, A. Chattopadhyay, D. Mukhopadhyay,  S. Dey, Y. Fei, Y. Belenky, I. Levi and T. Güneysu, "Towards secure composition of integrated circuits and electronic systems: On the role of EDA" . arXiv preprint arXiv:2001.09672, 2020.
  26. K. Nawaz , L. Van Brandt, I. Levi, F. X. Standaert and D. Flandre, "A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs" in Integration, the VLSI Journal, vol. 68, pp. 71-79, September 2019
  27. D. Bellizia, F. Berti, O. Bronchain, G. Cassiers, S. Duval, C. Guo, G. Leander, G. Leurent, I. Levi, C. Momin and O. Pereira, "Spook: Sponge-Based Leakage-Resilient Authenticated Encryption with a Masked Tweakable Block Cipher". Submission to NIST Lightweight Cryptography, 2019
  28. I. Levi, D. Bellizia and F. X. Standaert, "Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations and an Explanation Based on Externally-Amplified Couplings" in IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 293-317, no. 2, Feb. 2019
  29. R. Taco, I. Levi, M. Lanuzza and A. Fish, "An 88-fJ/40-MHz [0.4 V]–0.61-pJ/1-GHz [0.9 V] Dual-Mode Logic 8 $\times$ 8 bit Multiplier Accumulator With a Self-Adjustment Mechanism in 28-nm FD-SOI," in IEEE Journal of Solid-State Circuits, pp. 560-568, vol. 54, no. 2,  Feb. 2019
  30. I. Levi, A. Fish, and O. Keren. "Low-Cost Pseudoasynchronous Circuit Design Style With Reduced Exploitable Side Information." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26, no. 1 (2018): 82-95.
  31. R. Giterman, M. Vicentowski, I. Levi, Y. Weizman, O. Keren, and A. Fish. "Leakage Power Attack-Resilient Symmetrical 8T SRAM Cell." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 99 (2018): 1-5.
  32. K. Nawaz, I. Levi, F. X. Standaert, D. Flandre, "A Transient Noise Analysis of Secured Dual-rail based Logic Style" in Feedback, vol. 1, 2018
  33. I. Levi, N. Miller, E. Avni, O. Keren, and A. Fish. "A Survey of the Sensitivities of Security Oriented Flip-Flop Circuits." IEEE Access 5 (2017): 24797-24809.
  34. I. Levi and A. Fish, "Alternative Logic Families for Energy-Efficient and High Performance Chip Design" in Green Photonics and Electronics, pp. 139-172, 2017
  35. I. Levi, A. Fish, and O. Keren. "CPA secured data-dependent delay-assignment methodology." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25, no. 2 pp. 608-620, 2017
  36. L. Moyal, I. Levi, A. Teman and A. Fish, "Synthesis of Dual Mode Logic." Integration, the VLSI Journal 55, pp. 246-253, 2016
  37. R. Taco, I. Levi, A. Fish, and M. Lanuzza, "Low Voltage Logic Circuits Exploiting Gate Level Dynamic Body Biasing in 28 nm UTBB FD-SOI ", Solid State Electronics Journal, Elsevier, vol. 117, pp. 185-192, Mar 2016.
  38. M. Avital, I. Levi, O. Keren, and A. Fish. "CMOS based gates for blurring power information." IEEE Transactions on Circuits and Systems I: Regular Papers 63, no. 7, pp. 1033-1042, 2016
  39. V. Youzhaninov, I. Levi and A Fish "Design Flow and Characterization Methodology for Dual Mode Logic”, IEEE Access, vol. 3, pp. 3089-3101, Jan 2016
  40.  I. Levi, O. Keren, and A. Fish, "Data-Dependent Delays as a Barrier Against Power Attacks" IEEE Transactions on circuits and systems – I: Regular Papers, vol.62, no.8, pp. 2069-2078, Aug. 2015
  41. M. Avital, H. Dagan, I. Levi, O. Keren and A. Fish, “DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes”, IEEE Transactions on circuits and systems – I, vol. 62, issue 1, pp. 149-156, Jan 2015
  42. I. Levi, A. Albeck, A. Fish, and S. Wimer, “A Low Energy and High Performance DM^2 Adder,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 61, no. 11, pp. 3175–3183, Nov. 2014
  43. I. Levi, A. Belenky and A. Fish, “Logical Effort for CMOS based Dual Mode Logic (DML) gates”, IEEE Transactions on VLSI systems, vol. 22, issue 5, pp. 1042–1053, May 2014.
  44. I. Levi and A. Fish, “Dual Mode Logic: Design for Energy Efficiency and High Performance,” IEEE Access, vol. 1, pp. 258–265, 2013
  45. I. Levi, A. Kaizerman, and A. Fish, “Low voltage dual mode logic: Model analysis and parameter extraction,” Microelectronics Journal, Elsevier, vol. 44, issue 6, pp. 553-560, June 2013
  46. I. Levi, "Design and Implementation of Energy Efficient Dual Mode Logic", 2013

Conference Proceedings:

  1. N. Shalom and I. Levi, "Exploring Multi-Parameter Optimization of Automated High Level Synthesis (HLS) Tools and the Difficulty of Setting Complex Constraints", in IEEE Latin America Symposium on Circuits and Systems, LASCAS, Feb. 2023.
  2. O. Ganon and I. Levi, "Modular and Extensible Processor Architecture As a SW Seamless Playground, with Crypto. Application", IEEE NEWCAS 2023.
  3. D. Zooker, M. Elkoni, O. Ohev Shalom, Y. Weizman, I. Levi, O. Keren and A. Fish , "Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks" 2020 IEEE International Symposium on Circuits and Systems (ISCAS),  pp. 1-5, Seville, Spain, 2020
  4. Y. Rudin, I. Levi, A. Fish and O. Keren, "FPGA Implementation of pAsynch Design Paradigm," 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-5, Canary Islands, Spain, 2019
  5. K. Nawaz, I. Levi, F. X. Standaert, and D. Flandre. "A Transient Noise Analysis of Secured Dual-rail based Logic Style" submitted to New Generation of Circuits and Systems (NGCAS) 2018
  6. R. Taco, I. Levi, M. Lanuzza and A. Fish, "Energy-delay tradeoffs of low-voltage dual mode logic in 28nm FD-SOI," in 2017 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S),pp. 1-3,  Burlingame, CA, 2017
  7. D. Z. Raviv, I. Levi, A. Fish, and O Keren. "Secured Dual-Rail-Precharge Mux-based (DPMUX) symmetric-logic for low voltage applications." In SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S), 2017 IEEE, pp. 1-2
  8. M. Haber, I. Levi, Y. Yehoshua, and A. Fish. "Differential input output CMOS (DINO-CMOS)—High performance and energy efficient logic family" in SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S), 2017 IEEE, pp. 1-3
  9. R. Taco, I. Levi, M. Lanuzza, and A. Fish. "Evaluation of Dual Mode Logic in 28nm FD-SOI technology" in Circuits and Systems (ISCAS), 2017 IEEE International Symposium on, pp. 1-4
  10. R. Taco, I. Levi, A. Fish, and M. Lanuzza, "Extended Exploration of Low Granularity Back Biasing Control in 28nm UTBB FD-SOI Technology", IEEE International Symposium on Circuits and Systems (ISCAS),  Montreal, 2016
  11. R. Taco, I. Levi, M. Lanuzza, and A. Fish. "Low voltage ripple carry adder with low-granularity dynamic forward back-biasing in 28 nm UTBB FD-SOI" in SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S), 2015 IEEE, pp. 1-2
  12. R. Taco, I. Levi, A. Fish, and M. Lanuzza, "Back-Biasing in 28nm UTBB FD-SOI sLow voltage Ripple Carry Adder with low-Granularity Dynamic Forward”, IEEE SOI-3D-Subthreshold (S3S), 2015
  13. B. Frankel, M. Haber, M. Avital, I. Levi, O. Keren and A. Fish, “Practical design-knobs while performing Power AnalysisWorkshop on Trustworthy Manufacturing and Utilization of Secure Devices (Trudevice 2015- COST), Grenoble, France, 13 Mar 2015
  14. R. Taco, I. Levi, A. Fish, and M. Lanuzza, “Exploring back biasing opportunities in 28nm UTBB FD-SOI technology for subthreshold digital design,Proc. IEEEI 2014, pp. 1–4, Israel, Dec. 2014
  15. R. Buzilo, B. Likhterov, R. Giterman, I. Levi, A. Fish and A. Belenky, "Approach to integrated energy harvesting voltage source based on novel active TEG array system," 2014 IEEE Faible Tension Faible Consommation, pp. 1-4, Monaco, 2014
  16. I. Levi, O. Bass, A. Kaizerman, A. Belenky and A. Fish, “High Speed Dual Mode Logic Carry Look Ahead Adder”, Proc. IEEE International Symposium on Circuits and Systems, pp. 3037-3040, Seoul, Korea, May 2012

Books and Book Chapters:

  • I. Levi and A. Fish - Dual-Mode-Logic: A New Paradigm for Digital IC Design, Springer (signed), Jan, 2021
  • I. Levi and A. Fish - Alternative Logic Families for Energy-Efficient and Fast chip Design, in Eisenstein, G. and Bimberg, D. eds., "Green Photonics and Electronics", Springer International Publishing, 2017

Invited Talks:

  1. I. Levi “Unique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection”, Embedded Electronic Systems (EmbElec) Seminars Rennes INRIA, France (online), Jun. 2021.
  2. I. Levi “CAD-compatible SCA security mechanisms and their connection to externally amplified coupling (EAC) attacks on masked designs”, Technology Innovation Institute TII, Crypotography Research Center (CRC), Abu Dhabi (online), Aug. 2021.
  3. I. Levi, O. Keren and A.Fish “Embedded Randomness and Data Dependancies Design Paradigm: Advantages And Challanges”, Design, Automation and Test in Europe (DATE), Dresden, Germany, March 2018.
  4. I. Levi, O. Keren and A.Fish “Security Aware Pseudo-Asynchronous Circuit Design Style” to be presented, 2nd International Verification and Security Workshop (IVSW), Greece, July 2017.
  5.  I. Levi, O. Keren, and A. Fish, "CPA Secured Data-Dependent Delay-Assignment Methodology", to be presented, IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore MD, USA, 2017.
  6.  M. Avital, I. Levi, O. Keren, and A. Fish, "CMOS Based Gates for Blurring Power Information", to be presented, IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore MD, USA, 2017.
  7.  I. Levi, O. Keren, and A. Fish, "Hardware Security- New Concepts in Side-Channel-Analysis Immunity", CHIPEX2017, May 2017, Israel.
  8.  I. Levi, O. Keren, and A. Fish, "Data-Dependent Delays as a Barrier Against Power Attacks", IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, 2016.
  9. M. Avital, I. Levi, O. Keren, and A. Fish, "DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes", in 2016, IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, 2016.
  10. I. Levi, and A. Fish, "Dual-Mode-Logic", CHIPEX2012, May 2012, Israel.
  11. R. Taco, I. Levi, A. Fish, and M. Lanuzza, "Live Demo: an 88fJ / 40 MHz [0.4V] – 0.61pJ / 1GHz [0.9V] Dual Mode Logic 8x8-Bit Multiplier Accumulator with a Self-Adjustment Mechanism in 28 nm FD-SOI", has been accepted for a live demonstration at the 2019 IEEE International Symposium on Circuits and Systems (ISCAS), Japan May.
  12. I. Levi, “Unique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection”, Embedded Electronic Systems (EmbElec) Seminars Rennes INRIA, France (online), Jun. 2021.
  13. I. Levi, “CAD-compatible SCA security mechanisms and their connection to externally amplified coupling (EAC) attacks on masked designs”, Technology Innovation Institute TII, Cryptography Research Center (CRC), Abu Dhabi (online), Aug. 2021.