Publicaties
Gekozen filters:
Gekozen filters:
SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution KU Leuven
Modern processors implement sophisticated performance optimizations, such as out-of-order execution and speculation, that expose programs to so-called transient execution attacks. So far, such attacks rely on specific on-chip covert channels (e.g., cache timing), instilling the hope that they can be thwarted by closing or weakening these channels. In this paper, we consider the inevitable physical side effects of transient execution. We focus on ...
A 334 - μW 0.158 - mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom–Cook Multiplication KU Leuven
Lattice-based cryptography is a novel approach to public key cryptography (PKC), of which the mathematical investigation (so far) resists attacks from quantum computers. By choosing a module learning with errors (MLWE) algorithm as the next standard, the National Institute of Standards and Technology (NIST) follows this approach. The multiplication of polynomials is the central bottleneck in the computation of lattice-based cryptography. Because ...
Mining CryptoNight-Haven on the Varium C1100 Blockchain Accelerator Card KU Leuven
Cryptocurrency mining is an energy-intensive process that presents a prime candidate for hardware acceleration. This work-in-progress presents the first coprocessor design for the ASIC-resistant CryptoNight-Haven Proof of Work (PoW) algorithm. We construct our hardware accelerator as a Xilinx Run Time (XRT) RTL kernel targeting the Xilinx Varium C1100 Blockchain Accelerator Card. The design employs deeply pipelined computation and High Bandwidth ...
Circuits for Security and Secure Circuits: Implementation of cryptographic algorithms KU Leuven
It is an honor for me to write this overview article and share with the reader the topic of circuits and security. This topic has triggered my curiosity since I started as a Ph.D. student.