Abstract. Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigurability. We show that dynamic reconfiguration can also improve the resistance of cryptographic systems against physical attacks. First, we demonstrate how dynamic reconfiguration can realize a range of coun-termeasures which are standard for software implementations and that were practically not portable to hardware so far. Second, we introduce a new class of countermeasure that, to the best of our knowledge, has not been considered so far. This type of countermeasure provides increased resistance, in particular against fault...
The effective use of dynamic reconfiguration re-quires the designer to address many implementation i...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
The robustness of a chip designed for security-related applications depends on its capability to glo...
Dynamically reconfigurable systems are known to have many advantages such as area and power reductio...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
This thesis deals with the study of so-called mutating data paths and their utilization as a counter...
Summarization: In recent years the advantages of reconfigurable computing have make FPGAs important ...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
Since their publication in 1998, power analysis attacks have attracted significant attention within ...
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powe...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
Most of the countermeasures against fault attacks on cryptographic systems that have been developed ...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
The effective use of dynamic reconfiguration re-quires the designer to address many implementation i...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
The robustness of a chip designed for security-related applications depends on its capability to glo...
Dynamically reconfigurable systems are known to have many advantages such as area and power reductio...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
This thesis deals with the study of so-called mutating data paths and their utilization as a counter...
Summarization: In recent years the advantages of reconfigurable computing have make FPGAs important ...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
Since their publication in 1998, power analysis attacks have attracted significant attention within ...
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powe...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
Most of the countermeasures against fault attacks on cryptographic systems that have been developed ...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
The effective use of dynamic reconfiguration re-quires the designer to address many implementation i...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
The robustness of a chip designed for security-related applications depends on its capability to glo...