Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fault attacks. Thus, some masking and fault detection algorithms must be incor-porated into these implementations. These additions further increase the complexity of the cryptographic devices which already need to perform computationally-intensive opera-tions. Therefore, the general-purpose processors are usually supported by coprocessors/hardware accelerators to protect as well as to accelerate cryptographic applications. Using a configurable processor is just another solution. This work designs and implements robust execution units as an exten-sion to a configurable processor, which detect the data faults (adversarial or otherwise) while perf...
Cryptographic algorithm agility, i.e., the capability to switch between several encryption algorithm...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
The growing problem of breaches in information security in recent years has created a demand for ear...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Abstract. Hardware implementations of cryptographic algorithms are vulnerable to fault analysis atta...
Recent research has shown that fault diagnosis and possibly fault tolerance are important features w...
Abstract—Modern security-aware embedded systems need pro-tection against fault attacks. These attack...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Metho...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
This master thesis aims at securing cryptographic devices against two common types of attacks: side-...
Nowadays, we use embedded electronic devices in almost every aspect of our daily lives. They represe...
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processo...
Cryptographic algorithm agility, i.e., the capability to switch between several encryption algorithm...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
The growing problem of breaches in information security in recent years has created a demand for ear...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Abstract. Hardware implementations of cryptographic algorithms are vulnerable to fault analysis atta...
Recent research has shown that fault diagnosis and possibly fault tolerance are important features w...
Abstract—Modern security-aware embedded systems need pro-tection against fault attacks. These attack...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
This research provides a set of methods, tools and design guidelines that help a designer to constr...
Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Metho...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
This master thesis aims at securing cryptographic devices against two common types of attacks: side-...
Nowadays, we use embedded electronic devices in almost every aspect of our daily lives. They represe...
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processo...
Cryptographic algorithm agility, i.e., the capability to switch between several encryption algorithm...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
The growing problem of breaches in information security in recent years has created a demand for ear...