{"id":14,"date":"2020-05-24T19:25:41","date_gmt":"2020-05-24T19:25:41","guid":{"rendered":"http:\/\/www.eng.biu.ac.il\/leviita2\/?page_id=14"},"modified":"2025-01-30T08:54:58","modified_gmt":"2025-01-30T08:54:58","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.eng.biu.ac.il\/leviita2\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><span style=\"color:#ea9629\" class=\"tadv-color\">Journals<\/span><\/h3>\n\n\n<ol>\n<li>Anandakumar, N. Nalla, et al. \"White Paper-Hardware Security Attack Landscape and Countermeasures.\"\u00a0<i>Hardware Security Attack Landscape and Countermeasures<\/i>\u00a0(2024): 1-31.<\/li>\n<li>D. Dobkin, N. Cever, and <strong>I. Levi<\/strong>. \"RAD-FS: Remote Timing and Power SCA Security in DVFS-augmented Ultra-Low-Power Embedded Systems.\" ACM Transactions on Embedded Computing Systems (2025).<\/li>\n<li>Berti, <strong>I. Levi<\/strong>. \u201cProviding Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage\u201d. Cryptology ePrint Archive. 2024. (in evaluation).<\/li>\n<li>Berti, F-X. Standaert, I. <strong>Levi<\/strong>. Authenticity in the Presence of Leakage using a Forkcipher. Cryptology ePrint Archive. 2024. (in evaluation).<\/li>\n<li>D. Dobkin, E. Katz, D. Popovtzer, <strong>I. Levi<\/strong>. \u201cEMI Shielding for Use in Side-Channel Security: Analysis, Simulation and Measurements\u201d. Cryptology ePrint Archive. 2024.(in evaluation).<\/li>\n<li>D. Dobkin, N. Cever and <strong>I. Levi,<\/strong> \u201cRAD-FS - Inherent and Embedded SCA-Security in Ultra-Low Power IoTs\u201d, IACR Cryptology ePrint report 2024\/186, <a href=\"https:\/\/eprint.iacr.org\/2024\/186\">https:\/\/eprint.iacr.org\/2024\/186<\/a>, Fab. 2024 (in evaluation).<\/li>\n<li>E. Cohen, L. Yavits, B. M. Zaidel, A. Fish and <strong>I. Levi<\/strong> \u201c<a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=OJsc5ZAAAAAJ&amp;sortby=pubdate&amp;citation_for_view=OJsc5ZAAAAAJ:HoB7MX3m0LUC\">CoNfasTT: A Configurable, Scalable and Fast Dual Mode Logic-based NTT Design<\/a>\u201d <em>IEEE Access<\/em> 2024 Sep 17.<\/li>\n<li>Ganon and <strong>I. Levi<\/strong>, \"<a href=\"https:\/\/eprint.iacr.org\/2024\/059\">CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors<\/a>.\" IACR <em>Transactions on Cryptography Hardware and Embedded Systems<\/em>, T-CHES, 2024<\/li>\n<li>Katz, <strong>I. Levi<\/strong>, \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10423642\">Refined analytical EM model of IC-internal shielding for hardware-security and intra-device simulative framework<\/a>\". IEEE Access, DOI: 10.1109\/ACCESS.2024.3363184, Feb 2024.<\/li>\n<li>Danieli E, Goldzweig M, Avital M, <strong>Levi I<\/strong>. \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10366514\">Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF<\/a>\". IEEE Transactions on Information Forensics and Security. 2023 Dec 20. (Final Extended version)<\/li>\n<li>E. Katz, <strong>I. Levi<\/strong>, \u201cAn Accurate Analytical Side-Channel Electromagnetic (EM) Model and Inherent Integrated-Circuit (IC) Simulator\u201d. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, TCAD, Jun. 2023.<\/li>\n<li>D. Salomon and <strong>I. Levi<\/strong>, \u201cMaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case\u201d. Journal of Cryptographic Engineering, JCEN. 2023 May 29:1-8. (Extended version).<\/li>\n<li>E. Danieli, M. Goldzweig, M. Avital and <strong>I. Levi<\/strong>, \"Revealing the Secrets of Radio-Enabled<br \/>Embedded Systems: on extraction of raw information from any on-board signal through RF\", IACR Cryptology ePrint report 2023\/XXX, Apr. 2023..<\/li>\n<li>M. Avital and <strong>I. Levi<\/strong>, \"SCMA: Plaintext Classification Assisted Side Channel Spectral Modulation Attacks. Towards Noise-insensitive SCA Attacks...\", IACR Cryptology ePrint report 2023\/459, Mar. 2023.<\/li>\n<li>I. Stanger, N. Shavit, R. Taco, M. Lanuzza, L. Yavits, <strong>I. Levi<\/strong> and A. Fish, \"FlexDML: High Utilization Configurable Multimode Arithmetic Units Featuring Dual Mode Logic\", in <em>IEEE Solid-State Circuits Letters <\/em>(<em>SSC-L<\/em>)<em>. <\/em>Mar 2023, To appear.<\/li>\n<li>N. Shalom and <strong>I.Levi<\/strong>, \"Exploring Multi-Parameter Optimization of Automated High Level Synthesis (HLS) Tools and the Difficulty of Setting Complex Constraints\", in <em>IEEE Latin America Symposium on Circuits and Systems, LASCAS<\/em>, Feb. 2023.<\/li>\n<li>O. Gur, T. Gross, D. Bellizia, F. -X. Standaert and <strong>I. Levi<\/strong>, \"<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9964453\/authors#authors\">An In-Depth Evaluation of Externally Amplified Coupling (EAC) Attacks\u2014A Concrete Threat for Masked Cryptographic Implementations<\/a>,\" in\u00a0<em>IEEE Transactions on Circuits and Systems I: Regular Papers<\/em>, 2022, doi: 10.1109\/TCSI.2022.3222176.<\/li>\n<li><strong>I. Levi<\/strong> and C. Hazay, \"<a href=\"https:\/\/eprint.iacr.org\/2022\/901\/\">Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . .<\/a>\", IACR Cryptology ePrint report 2022\/901.<\/li>\n<li>R. Breuer, F.X. Standaert and <strong>I. Levi<\/strong>, \"<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=9805587\">Fully-Digital Randomization Based Side-Channel Security \u2014 Towards Ultra-Low Cost-per-Security<\/a>\", in <em>IEEE Access<\/em>, vol. 10, pp. 68440-68449, 2022, doi: 10.1109\/ACCESS.2022.3185995.<\/li>\n<li><strong>I. Levi<\/strong>, D. Bellizia and F.X. Standaert, \"T<a href=\"https:\/\/trebuchet.public.springernature.app\/get_content\/7d628be9-a4f9-44bb-9c27-a58c735c696a\">ight-ES-TRNG - Improved Construction and Robustness Analysis<\/a>\", <em>Journal of Computer Science, Springer-Nature<\/em>,\u00a0 DOI 10.1007\/s42979-022-01219-5.<\/li>\n<li>D. Salomon and\u00a0<strong>I. Levi<\/strong>, \u201c<a href=\"https:\/\/eprint.iacr.org\/2022\/124.pdf\">On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\\it{p}} test case<\/a>\u201d, IACR Cryptology ePrint report 2022\/124.<\/li>\n<li>N. Klein, E. Harel, and <strong>I. Levi<\/strong>, \u201c<a href=\"https:\/\/www.mdpi.com\/journal\/cryptography\/special_issues\/Hardware_Physical_Attacks\">The Cost of a True Random Bit\u2014On the Electronic Cost Gain of ASIC Time-Domain-Based TRNGs<\/a>\u201d, <em>MDPI Journal of Cryptography<\/em> <em>2021<\/em>, 5(3), 25;\u00a0 18 Sep 2021<\/li>\n<li>D. Salomon, A. Weiss, and <strong>I. Levi<\/strong>, \u201c<a href=\"https:\/\/www.mdpi.com\/2410-387X\/5\/3\/24\">Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis<\/a>\u201d, <em>MDPI Journal of Cryptography 2021<\/em>, 5(3), 24; 13 Sep 2021<\/li>\n<li>Y. Weizman, R. Giterman, O. Chertkow, M. Vizentovski, <strong>I. Levi<\/strong>, I. Sever, I. Kehati, O. Keren, and A. Fish,\u00a0 \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9453841\">Low-Cost Side-Channel Secure Standard 6T SRAM Based Memory with a 1% Area and less than 5% Latency and Power Overheads<\/a>\" - <em>IEEE Access<\/em>, vol. 9, pp. 91764-91776, 2021<\/li>\n<li>R. Breuer and <strong>I. Levi<\/strong>, \"<a href=\"http:\/\/www.eng.biu.ac.il\/leviita2\/files\/2020\/12\/How-Bad-Are-Bad-Templates-Optimistic-Design-Stage-Side-Channel-Security-Evaluation-and-its-Cost.pdf\">How Bad Are Bad Templates Optimistic Design Stage Side-Channel Security Evaluation and its Cost<\/a>\", <i>Cryptography<\/i>\u00a04.4 (2020): 36<\/li>\n<li>G. Cassiers, B. Gr\u00e9goire,<strong> I. Levi<\/strong>, and F.X. Standaert, \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9190067\">Hardware Private Circuits: From Trivial Composition to Full Veri\ufb01cation,<\/a>\" <em>IEEE Transactions on Computers<\/em>, doi: 10.1109\/TC.2020.3022979<\/li>\n<li><strong>I. Levi<\/strong>, D. Bellizia, D. Bol, and F-X. Standaert, \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9131818\">Ask Less Get More: Side-Channel Signal Hiding, Revisited<\/a>\", <em>IEEE Transactions of Circuits And Systems-I (TCAS-I): regular papers<\/em>, DOI: 10.1109\/TCSI.2020.3005338.<\/li>\n<li>B. Bilgin, L. De Meyer, S. Duval, <strong>I. Levi<\/strong>,\u00a0 and F.X. Standaert, \"<a href=\"https:\/\/limo.libis.be\/primo-explore\/fulldisplay?docid=LIRIAS3148712&amp;context=L&amp;vid=Lirias&amp;search_scope=Lirias&amp;tab=default_tab&amp;lang=en_US&amp;fromSitemap=1\">Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking<\/a><a href=\"\/\/madrid.eng.biu.ac.il\/engguest\/korncla\/Downloads\/8562-Article%20Text-5106-1-10-20200507.pdf\">\"<\/a>. I<em>ACR Transactions on Symmetric Cryptology<\/em>, pp. 144-184, 2020<\/li>\n<li><strong>I. Levi<\/strong>, D. Bellizia, and F. X. Standaert. \"<a href=\"https:\/\/perso.uclouvain.be\/fstandae\/PUBLIS\/236.pdf\">Beyond Algorithmic Noise. Or How to Shuffle Parallel Implementations?<\/a>\", <em>International Journal of Circuit Theory and Applications<\/em>, vol. 48, issue 5, pp. 674-695, May 2020<\/li>\n<li>G. Cassiers, B. Gr\u00e9goire,<strong> I. Levi<\/strong>, and F.X. Standaert, \"<a href=\"https:\/\/eprint.iacr.org\/2020\/185.pdf\">Hardware Private Circuits: From Trivial Composition to Full Verification<\/a>\". cryptology eprint, 2020<\/li>\n<li>J. Knechtel, E.B. Kavun, F. Regazzoni, A. Heuser, A. Chattopadhyay, D. Mukhopadhyay,\u00a0 S. Dey, Y. Fei, Y. Belenky, <strong>I. Levi<\/strong> and T. G\u00fcneysu, \"<a href=\"https:\/\/arxiv.org\/pdf\/2001.09672.pdf\">Towards secure composition of integrated circuits and electronic systems: On the role of EDA<\/a>\" . <i>arXiv preprint arXiv:2001.09672, <\/i>2020.<\/li>\n<li>K. Nawaz , L. Van Brandt, <strong>I. Levi<\/strong>, F. X. Standaert and D. Flandre, \"<a href=\"https:\/\/dial.uclouvain.be\/pr\/boreal\/object\/boreal%3A218594\/datastream\/PDF_01\/view\">A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs<\/a>\" in <em>Integration, the VLSI Journal<\/em>, vol. 68, pp. 71-79, September 2019<\/li>\n<li>D. Bellizia, F. Berti, O. Bronchain, G. Cassiers, S. Duval, C. Guo, G. Leander, G. Leurent, <strong>I. Levi<\/strong>, C. Momin and O. Pereira, \"<a href=\"https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/lightweight-cryptography\/documents\/round-2\/spec-doc-rnd2\/Spook-spec-round2.pdf\">Spook: Sponge-Based Leakage-Resilient Authenticated Encryption with a Masked Tweakable Block Cipher<\/a>\". <em>Submission to NIST Lightweight Cryptography<\/em>, 2019<\/li>\n<li><strong>I. Levi<\/strong>, D. Bellizia and F. X. Standaert, \"<a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7393\/6565\">Reducing a Masked Implementation\u2019s Effective Security Order with Setup Manipulations and an Explanation Based on Externally-Amplified Couplings<\/a>\" in <em>IACR Transactions on Cryptographic Hardware and Embedded Systems, <\/em>pp. 293-317, no. 2, Feb. 2019<\/li>\n<li>R. Taco, <strong>I. Levi<\/strong>, M. Lanuzza and A. Fish, \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8574058\">An 88-fJ\/40-MHz [0.4 V]\u20130.61-pJ\/1-GHz [0.9 V] Dual-Mode Logic 8 $\\times$ 8 bit Multiplier Accumulator With a Self-Adjustment Mechanism in 28-nm FD-SOI<\/a>,\" in <em>IEEE Journal of Solid-State Circuits<\/em>, pp. 560-568, vol. 54, no. 2,\u00a0 Feb. 2019<\/li>\n<li><strong>I. Levi<\/strong>, A. Fish, and O. Keren. \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8070392\">Low-Cost Pseudoasynchronous Circuit Design Style With Reduced Exploitable Side Information.<\/a>\" <em>IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26, no. 1 (2018): 82-95.<\/em><\/li>\n<li>R. Giterman, M. Vicentowski, <strong>I. Levi<\/strong>, Y. Weizman, O. Keren, and A. Fish. \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8374988\">Leakage Power Attack-Resilient Symmetrical 8T SRAM Cell.<\/a>\" <em>IEEE Transactions on Very Large Scale Integration (VLSI) Systems 99 (2018<\/em>): 1-5.<\/li>\n<li>K. Nawaz, <strong>I. Levi<\/strong>, F. X. Standaert, D. Flandre, \"<a href=\"https:\/\/www.researchgate.net\/publication\/330742047_A_Transient_Noise_Analysis_of_Secured_Dual-rail_based_Logic_Style\">A Transient Noise Analysis of Secured Dual-rail based Logic Style<\/a>\" in <em>Feedback, vol. 1, <\/em>2018<\/li>\n<li><strong>I. Levi<\/strong>, N. Miller, E. Avni, O. Keren, and A. Fish. \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8094119\">A Survey of the Sensitivities of Security Oriented Flip-Flop Circuits<\/a>.\" <em>IEEE Access 5 (2017)<\/em>: 24797-24809.<\/li>\n<li><strong>I. Levi<\/strong> and A. Fish, \"<a href=\"https:\/\/www.scinapse.io\/papers\/2768432860\">Alternative Logic Families for Energy-Efficient and High Performance Chip Design<\/a>\" in <em>Green Photonics and Electronics,<\/em> pp. 139-172, 2017<\/li>\n<li><strong>I. Levi<\/strong>, A. Fish, and O. Keren. \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7527634\">CPA secured data-dependent delay-assignment methodology.<\/a>\" <em>IEEE Transactions on Very Large Scale Integration (VLSI) Systems<\/em> 25, no. 2 pp. 608-620, 2017<\/li>\n<li>L. Moyal, <strong>I. Levi<\/strong>,\u00a0A. Teman and A. Fish, \"<a href=\"https:\/\/reader.elsevier.com\/reader\/sd\/pii\/S0167926016300360?token=41EBAA2D6D36B7070D72C7F092731DE63D9B44E95D0193D1A860E2F62D173FFF4E8A2605C95B0B615107269F437E1954\">Synthesis of Dual Mode Logic<\/a>.\" <em>Integration, the VLSI Journal<\/em> 55, pp. 246-253, 2016<\/li>\n<li>R. Taco, <strong>I. Levi<\/strong>, A. Fish, and M. Lanuzza, \"<a href=\"https:\/\/reader.elsevier.com\/reader\/sd\/pii\/S0038110115003329?token=4AEAC523C2418F7F91C9F542D025AEAD429BF31CD092975E71B90E7547BE44DBC1765F7E44F61DFFB28710B7D84ADBA9\">Low Voltage Logic Circuits Exploiting Gate Level Dynamic Body Biasing in 28 nm UTBB FD-SOI<\/a> \", <em>Solid State Electronics Journal<\/em>, Elsevier, vol. 117, pp. 185-192, Mar 2016.<\/li>\n<li>M. Avital, <strong>I. Levi<\/strong>, O. Keren, and A. Fish. \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7494672\">CMOS based gates for blurring power information.<\/a>\" <em>IEEE Transactions on Circuits and Systems I: Regular Papers<\/em> 63, no. 7, pp. 1033-1042, 2016<\/li>\n<li>V. Youzhaninov, <strong>I. Levi<\/strong> and A Fish \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7370913\">Design Flow and Characterization Methodology for Dual Mode Logic<\/a>\u201d, <em>IEEE Access<\/em>, vol. 3, pp. 3089-3101, Jan 2016<\/li>\n<li>\u00a0<strong>I. Levi<\/strong>, O. Keren, and A. Fish, \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7166411\">Data-Dependent Delays as a Barrier Against Power Attacks<\/a>\" <em>IEEE Transactions on circuits and systems \u2013 I: Regular Papers<\/em>, vol.62, no.8, pp. 2069-2078, Aug. 2015<\/li>\n<li>M. Avital, H. Dagan, <strong>I. Levi<\/strong>, O. Keren and A. Fish, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6998067\">DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes<\/a>\u201d, <em>IEEE Transactions on circuits and systems \u2013 I<\/em>, vol. 62, issue 1, pp. 149-156, Jan 2015<\/li>\n<li><strong>I. Levi<\/strong>, A. Albeck, A. Fish, and S. Wimer, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6858090\">A Low Energy and High Performance DM^2 Adder<\/a>,\u201d <em>IEEE Transactions on Circuits and Systems I: Regular Papers<\/em>, vol. 61, no. 11, pp. 3175\u20133183, Nov. 2014<\/li>\n<li><strong>I. Levi<\/strong>, A. Belenky and A. Fish, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6515657\">Logical Effort for CMOS based Dual Mode Logic (DML) gates<\/a>\u201d, <em>IEEE Transactions on VLSI systems<\/em>, vol. 22, issue 5, pp. 1042\u20131053, May 2014.<\/li>\n<li><strong>I. Levi<\/strong> and A. Fish, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6514913\">Dual Mode Logic: Design for Energy Efficiency and High Performance<\/a>,\u201d <em>IEEE Access<\/em>, vol. 1, pp. 258\u2013265, 2013<\/li>\n<li><strong>I. Levi<\/strong>, A. Kaizerman, and A. Fish, \u201c<a href=\"https:\/\/reader.elsevier.com\/reader\/sd\/pii\/S002626921300075X?token=C5880ED1E1F9BD12353359AA7D59486140527F6E1D1CA78E8F0C4E4A04D8287F06464235C878F1F6855C7E364D4946AE\">Low voltage dual mode logic: Model analysis and parameter extraction<\/a>,\u201d <em>Microelectronics Journal<\/em>, Elsevier, vol. 44, issue 6, pp. 553-560, June 2013<\/li>\n<li><strong>I. Levi<\/strong>, \"Design and Implementation of Energy Efficient Dual Mode Logic\", 2013<\/li>\n<\/ol>\n<h3><span style=\"color: #ff9900\">Conference Proceedings:<\/span><\/h3>\n<ol>\n<li>F. Berti, C. Hazay, and <strong>I. Levi<\/strong>, \u201cLR-OT: leakage-resilient oblivious transfer\u201d. In International Conference on Security and Cryptography for Networks (SCN) 2024 Sep 10 (pp. 182-204). Cham: Springer Nature Switzerland.<\/li>\n<li>M. Avital, D. Moscovitz, and <strong>I. Levi<\/strong>, \"Enhancing EMI-Packaging to Protect against Fault Injection and Side-Channel Attacks\". IEEE International Conference on Microwaves, Communications, Antennas, Biomedical Engineering and Electronic Systems (COMCAS) 2024.<\/li>\n<li>A. Barron, J. Shor, and <strong>I. Levi<\/strong>, \"Comparative Evaluation of Sensors for Active Adversaries by Laser Fault Injection Detection\". IEEE International Conference on Microwaves, Communications, Antennas, Biomedical Engineering and Electronic Systems (COMCAS) 2024.<\/li>\n<li>F. Berti, C. Hazay, and <strong>I. Levi<\/strong>, \"State-of-the-Art on Leakage-Resilient Symmetric-Key Cryptography: Outlook, Challenges and Bottlenecks\u201d, IEEE International Conference on Microwaves, Communications, Antennas, Biomedical Engineering and Electronic Systems (COMCAS) 2024.<\/li>\n<li>E. Danieli,<strong> I. Levi<\/strong>, R. Richter, and Y.Richter, \"A Taxonomy of Multi-Modal Cyber Radio Frequency (CRF) Mitigation Based on Passive Geo-location and Hardware Sensors\", IEEE COMCAS 2024.<\/li>\n<li>N. Shalom and <strong>I. Levi<\/strong>, \"Exploring Multi-Parameter Optimization of Automated High Level Synthesis (HLS) Tools and the Difficulty of Setting Complex Constraints\", in IEEE Latin America Symposium on Circuits and Systems, LASCAS, Feb. 2023.<\/li>\n<li>O. Ganon and <strong>I. Levi<\/strong>, \"Modular and Extensible Processor Architecture As a SW Seamless Playground, with Crypto. Application\", IEEE NEWCAS 2023.<\/li>\n<li>D. Zooker, M. Elkoni, O. Ohev Shalom, Y. Weizman, <strong>I. Levi<\/strong>, O. Keren and A. Fish , \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9180478\">Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks<\/a>\" <em>2020 IEEE International Symposium on Circuits and Systems (ISCAS)<\/em>,\u00a0 pp. 1-5, Seville, Spain, 2020<\/li>\n<li style=\"text-align: justify\">Y. Rudin, <strong>I. Levi<\/strong>, A. Fish and O. Keren, \"<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8763813\">FPGA Implementation of pAsynch Design Paradigm<\/a>,\"<em> 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS),<\/em> pp. 1-5, Canary Islands, Spain, 2019<\/li>\n<li style=\"text-align: justify\">K. Nawaz, <strong>I. Levi<\/strong>, F. X. Standaert, and D. Flandre. \"<a href=\"https:\/\/www.researchgate.net\/profile\/Kashif_Nawaz3\/publication\/330742047_A_Transient_Noise_Analysis_of_Secured_Dual-rail_based_Logic_Style\/links\/5c522af492851c22a39d2649\/A-Transient-Noise-Analysis-of-Secured-Dual-rail-based-Logic-Style.pdf\">A Transient Noise Analysis of Secured Dual-rail based Logic Style<\/a>\" submitted to <em>New Generation of Circuits and Systems (NGCAS)<\/em> 2018<\/li>\n<li>R. Taco, <strong>I. Levi<\/strong>, M. Lanuzza and A. Fish, \"<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8309250\">Energy-delay tradeoffs of low-voltage dual mode logic in 28nm FD-SOI<\/a>,\" in 2<em>017 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S)<\/em>,pp. 1-3,\u00a0 Burlingame, CA, 2017<\/li>\n<li style=\"text-align: justify\">D. Z. Raviv, <strong>I. Levi<\/strong>, A. Fish, and O Keren. \"<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8309254\">Secured Dual-Rail-Precharge Mux-based (DPMUX) symmetric-logic for low voltage applications<\/a>.\" In <em>SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S)<\/em>, 2017 IEEE, pp. 1-2<\/li>\n<li style=\"text-align: justify\">M. Haber, <strong>I. Levi<\/strong>, Y. Yehoshua, and A. Fish. \"<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8309253\">Differential input output CMOS (DINO-CMOS)\u2014High performance and energy efficient logic family<\/a>\" in <em>SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S)<\/em>, 2017 IEEE, pp. 1-3<\/li>\n<li>R. Taco, I. Levi, M. Lanuzza, and A. Fish. \"<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8050998\">Evaluation of Dual Mode Logic in 28nm FD-SOI technology<\/a>\" in <em>Circuits and Systems (ISCAS), 2017 IEEE International Symposium<\/em> on, pp. 1-4<\/li>\n<li>R. Taco, I. Levi, A. Fish, and M. Lanuzza, \"<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7527165\">Extended Exploration of Low Granularity Back Biasing Control in 28nm UTBB FD-SOI Technology<\/a>\", <em>IEEE International Symposium on Circuits and Systems (ISCAS)<\/em>,\u00a0 Montreal, 2016<\/li>\n<li style=\"text-align: justify\">R. Taco, <strong>I. Levi<\/strong>, M. Lanuzza, and A. Fish. \"<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7333515\">Low voltage ripple carry adder with low-granularity dynamic forward back-biasing in 28 nm UTBB FD-SOI<\/a>\" in <em>SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S)<\/em>, 2015 IEEE, pp. 1-2<\/li>\n<li style=\"text-align: justify\">R. Taco, <strong>I. Levi<\/strong>, A. Fish, and M. Lanuzza, \"<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7333515?reload=true&amp;arnumber=7333515\">Back-Biasing in 28nm UTBB FD-SOI sLow voltage Ripple Carry Adder with low-Granularity Dynamic Forward<\/a>\u201d, <em>IEEE SOI-3D-Subthreshold (S3S)<\/em>, 2015<\/li>\n<li style=\"text-align: justify\">B. Frankel, M. Haber, M. Avital, <strong>I. Levi<\/strong>, O. Keren and A. Fish, \u201c<a href=\"https:\/\/www.uaq.mx\/statsoft\/stpowan.html#power_doe\">Practical design-knobs while performing Power Analysis<\/a>\u201d <em>Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (Trudevice 2015- COST)<\/em>, Grenoble, France, 13 Mar 2015<\/li>\n<li style=\"text-align: justify\">R. Taco, <strong>I. Levi<\/strong>, A. Fish, and M. Lanuzza, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7005822\">Exploring back biasing opportunities in 28nm UTBB FD-SOI technology for subthreshold digital design,<\/a>\u201d <em>Proc. IEEEI<\/em> 2014, pp. 1\u20134, Israel, Dec. 2014<\/li>\n<li style=\"text-align: justify\">R. Buzilo, B. Likhterov, R. Giterman, <strong>I. Levi<\/strong>, A. Fish and A. Belenky, \"<a href=\"https:\/\/ieeexplore.ieee.org\/document\/6828593\">Approach to integrated energy harvesting voltage source based on novel active TEG array system,<\/a>\" <em>2014 IEEE Faible Tension Faible Consommation<\/em>, pp. 1-4, Monaco, 2014<\/li>\n<li style=\"text-align: justify\"><strong>I. Levi<\/strong>, O. Bass, A. Kaizerman, A. Belenky and A. Fish, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/6271959\">High Speed Dual Mode Logic Carry Look Ahead Adder<\/a>\u201d, <em>Proc. IEEE International Symposium on Circuits and Systems<\/em>, pp. 3037-3040, Seoul, Korea, May 2012<\/li>\n<\/ol>\n<h3><span style=\"color: #ff9900\">Books and Book Chapters:<\/span><\/h3>\n<ul>\n<li><strong>I. Levi<\/strong> and A. Fish - <a href=\"https:\/\/www.springer.com\/gp\/book\/9783030407858#aboutAuthors\">Dual-Mode-Logic: A New Paradigm for Digital IC Design<\/a>, Springer (signed), Jan, 2021<\/li>\n<li><strong>I. Levi<\/strong> and A. Fish - Alternative Logic Families for Energy-Efficient and Fast chip Design, in Eisenstein, G. and Bimberg, D. eds., \"Green Photonics and Electronics\", Springer International Publishing, 2017<\/li>\n<\/ul>\n<h3><span style=\"color: #ff9900\">Invited Talks:<\/span><\/h3>\n<ol>\n<li><strong>I. Levi<\/strong> \u201cUnique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection\u201d, Embedded Electronic Systems (EmbElec) Seminars Rennes INRIA, France (online), Jun. 2021.<\/li>\n<li><strong>I. Levi<\/strong> \u201cCAD-compatible SCA security mechanisms and their connection to externally amplified coupling (EAC) attacks on masked designs\u201d, Technology Innovation Institute TII, Crypotography Research Center (CRC), Abu Dhabi (online), Aug. 2021.<\/li>\n<li class=\"x_MsoNormal\"><b>I. Levi<\/b>, O. Keren and A.Fish \u201cEmbedded Randomness and Data Dependancies Design Paradigm: Advantages And Challanges\u201d, <em>Design, Automation and Test in Europe (DATE)<\/em>, Dresden, Germany, March 2018.<\/li>\n<li><b>I. Levi<\/b>, O. Keren and A.Fish \u201cSecurity Aware Pseudo-Asynchronous Circuit Design Style\u201d to be presented, <em>2nd International Verification and Security Workshop (IVSW)<\/em>, Greece, July 2017.<\/li>\n<li>\u00a0<b>I. Levi<\/b>, O. Keren, and A. Fish, \"CPA Secured Data-Dependent Delay-Assignment Methodology\", to be presented,\u00a0<i>IEEE International Symposium on Circuits and Systems (ISCAS)<\/i>, Baltimore MD, USA, 2017.<\/li>\n<li>\u00a0M. Avital,\u00a0<b>I. Levi<\/b>, O. Keren, and A. Fish, \"CMOS Based Gates for Blurring Power Information\", to be presented,\u00a0<i>IEEE International Symposium on Circuits and Systems (ISCAS)<\/i>, Baltimore MD, USA, 2017.<\/li>\n<li>\u00a0<b>I. Levi<\/b>, O. Keren, and A. Fish, \"Hardware Security- New Concepts in Side-Channel-Analysis Immunity\",\u00a0<i>CHIPEX2017<\/i>, May 2017, Israel.<\/li>\n<li>\u00a0<b>I. Levi<\/b>, O. Keren, and A. Fish, \"Data-Dependent Delays as a Barrier Against Power Attacks\", <i>IEEE International Symposium on Circuits and Systems (ISCAS)<\/i>, Montreal, 2016.<\/li>\n<li>M. Avital,\u00a0<b>I. Levi<\/b>, O. Keren, and A. Fish, \"DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes\", in 2016,\u00a0<i>IEEE International Symposium on Circuits and Systems (ISCAS)<\/i>, Montreal, 2016.<\/li>\n<li><b>I. Levi<\/b>, and A. Fish, \"Dual-Mode-Logic\",\u00a0<i>CHIPEX2012<\/i>, May 2012, Israel.<\/li>\n<li>R. Taco,\u00a0<b>I. Levi<\/b>, A. Fish, and M. Lanuzza, \"Live Demo: an 88fJ \/ 40 MHz [0.4V] \u2013 0.61pJ \/ 1GHz [0.9V] Dual Mode Logic 8x8-Bit Multiplier Accumulator with a Self-Adjustment Mechanism in 28 nm FD-SOI\", has been accepted for a live demonstration at the <em>2019 IEEE International Symposium on Circuits and Systems (ISCAS)<\/em>, Japan May.<\/li>\n<li><strong>I. Levi<\/strong>, \u201cUnique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection\u201d, Embedded Electronic Systems (EmbElec) Seminars Rennes INRIA, France (online), Jun. 2021.<\/li>\n<li><strong>I. Levi<\/strong>, \u201cCAD-compatible SCA security mechanisms and their connection to externally amplified coupling (EAC) attacks on masked designs\u201d, Technology Innovation Institute TII, Cryptography Research Center (CRC), Abu Dhabi (online), Aug. 2021.<\/li>\n<\/ol>\n<p class=\"x_MsoNormal\">\u00a0<\/p>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journals Anandakumar, N. Nalla, et al. &#8220;White Paper-Hardware Security Attack Landscape and Countermeasures.&#8221;\u00a0Hardware Security Attack Landscape and Countermeasures\u00a0(2024): 1-31. D. Dobkin, N. Cever, and I. Levi. &#8220;RAD-FS: Remote Timing and Power SCA Security in DVFS-augmented Ultra-Low-Power Embedded Systems.&#8221; ACM Transactions on Embedded Computing Systems (2025). Berti, I. Levi. \u201cProviding Integrity for Authenticated Encryption in the &hellip; <a href=\"https:\/\/www.eng.biu.ac.il\/leviita2\/publications\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Publications<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":76,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-14","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.eng.biu.ac.il\/leviita2\/wp-json\/wp\/v2\/pages\/14"}],"collection":[{"href":"https:\/\/www.eng.biu.ac.il\/leviita2\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eng.biu.ac.il\/leviita2\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eng.biu.ac.il\/leviita2\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eng.biu.ac.il\/leviita2\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":132,"href":"https:\/\/www.eng.biu.ac.il\/leviita2\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/www.eng.biu.ac.il\/leviita2\/wp-json\/wp\/v2\/pages\/14\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/www.eng.biu.ac.il\/leviita2\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}