Crypto-processors are prone to security attacks based on the observation of their power consumption profile. We propose new techniques for increasing the non-determinism of such a profile, which rely on the idea of introducing randomness in the bus data transfers. This is achieved by combining data scrambling with energy-efficient bus encoding, thus providing high information protection at no energy cost. Results on a set of bus traces originated by real-life applications demonstrate the applicability of the proposed solutio
Autonomous energy harvesting sensors present one of the most attractive areas of microelectronics at...
Secure systems require strong encryption and authentication protocols. Secure systems are used are c...
In many applications, it is desirable to design digital processors that allow a trade-off between th...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Memory systems security has increased over the last decade due to the sensitive information which is...
The computational effort required to guarantee the security of a communication, due to the complexit...
Cryptographic algorithms have played an important role in information security for protecting privac...
Differential power analysis is a very effective cryptanalysis technique that extracts information on...
Differential power analysis is a very effective cryptanalysis technique that extracts information on...
Differential power analysis (DPA) has become a real-world threat to the security of cryptographic ha...
The address sequence on the processor-memory bus can reveal abundant information about the control o...
This thesis deals with the study of so-called mutating data paths and their utilization as a counter...
Providing data confidentiality for energyconstrained devices has proven to be a hard problem. Over t...
Autonomous energy harvesting sensors present one of the most attractive areas of microelectronics at...
Secure systems require strong encryption and authentication protocols. Secure systems are used are c...
In many applications, it is desirable to design digital processors that allow a trade-off between th...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Memory systems security has increased over the last decade due to the sensitive information which is...
The computational effort required to guarantee the security of a communication, due to the complexit...
Cryptographic algorithms have played an important role in information security for protecting privac...
Differential power analysis is a very effective cryptanalysis technique that extracts information on...
Differential power analysis is a very effective cryptanalysis technique that extracts information on...
Differential power analysis (DPA) has become a real-world threat to the security of cryptographic ha...
The address sequence on the processor-memory bus can reveal abundant information about the control o...
This thesis deals with the study of so-called mutating data paths and their utilization as a counter...
Providing data confidentiality for energyconstrained devices has proven to be a hard problem. Over t...
Autonomous energy harvesting sensors present one of the most attractive areas of microelectronics at...
Secure systems require strong encryption and authentication protocols. Secure systems are used are c...
In many applications, it is desirable to design digital processors that allow a trade-off between th...