Publicaties
Gekozen filters:
Gekozen filters:
Low-Latency Threshold Implementations for Side-Channel Protected Cryptographic Hardware KU Leuven
Current countermeasures against physical attacks on hardware implementations of cryptographic primitives focus on specific attacks and therefore fail against combined (e.g. fault and differential power) attacks. Moreover, the overhead for adding such countermeasures is enormous. The purpose of this thesis is to investigate new methods (like threshold implementations) and design approaches (e.g. leakage resilient crypto) in order to thwart the ...
Secure hardware implementations of non-linear functions in the presence of glitches KU Leuven
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operation can be countered by employing masking techniques. In the presence of glitches, most of the currently known masking techniques still leak information during the computation of non-linear functions. We discuss a recently introduced masking method which is based on ...
Using normal bases for compact hardware implementations of the AES S-box KU Leuven
The substitution box (S-box) of the Advanced Encryption Standard (AES) is based on the multiplicative inversion s(x)∈=∈x -∈1 in GF(256) and followed by an affine transformation in GF(2). The S-box is the most expansive building block of any hardware implementation of the AES, and the multiplicative inversion is the most costly step of the S-box transformation. There exist many publications about hardware implementations of the S-box and the ...
A Systematic M safe-error Detection in Hardware Implementations of Cryptographic Algorithms KU Leuven
This paper presents a procedure that checks whether a hardware implementation of a cryptographic algorithm is vulnerable to M safe-error attacks. It takes a registertransfer level (RTL) description of a design as an input and exposes the exact timing and a memory element that is a possible target of the attack. As a proof of concept, the presented procedure is applied to a hardware implementation of the Montgomery Powering Ladder, an ...
Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things KU Leuven
© 2016 IEEE. Verification of an ECDSA signature requires a double scalar multiplication on an elliptic curve. In this work, we study the computation of this operation on a twisted Edwards curve with an efficiently computable endomorphism, which allows reducing the number of point doublings by approximately 50 percent compared to a conventional implementation. In particular, we focus on a curve defined over the 207-bit prime field $\mathbb {F}-p$ ...
Securing Cryptographic Hardware against Fault Attacks (Het beveiligen van cryptografische hardware tegen foutaanvallen) KU Leuven
This research provides a set of methods, tools and design guidelines that help a designer to construct an embedded device that is secure against fault attacks. The main idea behind fault attacks is to disturb the normal operation of a cryptographic embedded device by applying some form of physical stress in order to collect the faulty outputs and exploit them to reveal the secret data. Security against fault attacks is today an important ...
Hardware and Software Architecture for AUV based on Low-cost Sensors Vrije Universiteit Brussel
The use of Autonomous Underwater Vehicles (AUV) as robots for exploration and oceanology science has been a field of interest of several universities and research center's around the world in the last decade. Cuba being a country surrounded by the Caribbean Sea, having most of it's resources in it. Researchers from the Central University of Las Villas (UCLV) and the Hydrographic Research Center (HRC) have joined forces in the development of the ...
Towards a generic optimal co-design of hardware architecture and control configuration for interacting subsystems Universiteit Gent Universiteit Antwerpen
In plants consisting of multiple interacting subsystems, the decision on how to optimally select and place actuators and sensors and the accompanying question on how to control the overall plant is a challenging task. Since there is no theoretical framework describing the impact of sensor and actuator placement on performance, an optimization method exploring the possible configurations is introduced in this paper to find a trade-off between ...