This thesis addresses lightweight hardware design and countermeasures to improve cryptographic computation. Because cryptography (and cryptanalysis) is nowadays becoming more and more ubiquitous in our daily lives, it is crucial that newly developed systems are robust enough to deal with the increasing amount of processing data without compromising the overall security. This work addresses many different topics related to lightweight cryptographic implementations. The main contributions of this thesis are: - A new cryptographic hardware acceleration scheme applied to BCH codes; - Hardware power minimization applied to SoCs and embedded devices; - Timing and DPA lightweight countermeasures applied to the reconfigurable AES block cipher; - CS...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Lightweight cryptography is a new concept that refers to a method of bettering data security through...
Information security relies on the correct interaction of several abstraction layers: hardware, oper...
This thesis addresses lightweight hardware design and countermeasures to improve cryptographic compu...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
The work presented in this thesis has been completed as part of the FUI Paclido project, whose aim i...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
While the internet of things (IoT) promises many advances for businesses, administrations and citize...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Si l’internet des objets laisse entrevoir de nouvelles perspectives, tantpour les entreprises que po...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Lightweight cryptography is a new concept that refers to a method of bettering data security through...
Information security relies on the correct interaction of several abstraction layers: hardware, oper...
This thesis addresses lightweight hardware design and countermeasures to improve cryptographic compu...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
The work presented in this thesis has been completed as part of the FUI Paclido project, whose aim i...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
While the internet of things (IoT) promises many advances for businesses, administrations and citize...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Si l’internet des objets laisse entrevoir de nouvelles perspectives, tantpour les entreprises que po...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Lightweight cryptography is a new concept that refers to a method of bettering data security through...
Information security relies on the correct interaction of several abstraction layers: hardware, oper...