Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigurability. We show that dynamic reconfiguration can also improve the resistance of cryptographic systems against physical attacks. First, we demonstrate how dynamic reconfiguration can realize a range of countermeasures which are standard for software implementations and that were practically not portable to hardware so far. Second, we introduce a new class of countermeasure that, to the best of our knowledge, has not been considered so far. This type of countermeasure provides increased resistance, in particular against fault attacks, b...
In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its v...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
The robustness of a chip designed for security-related applications depends on its capability to glo...
Abstract. Dynamically reconfigurable systems are known to have many advantages such as area and powe...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
Summarization: In recent years the advantages of reconfigurable computing have make FPGAs important ...
This thesis deals with the study of so-called mutating data paths and their utilization as a counter...
Since their publication in 1998, power analysis attacks have attracted significant attention within ...
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powe...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Most of the countermeasures against fault attacks on cryptographic systems that have been developed ...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its v...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
The robustness of a chip designed for security-related applications depends on its capability to glo...
Abstract. Dynamically reconfigurable systems are known to have many advantages such as area and powe...
International audienceWith the Internet of Things, an increasing amount of sensitive data have to be...
International audienceWith the Internet of Things (IoT) an increasing amount of sensitive data have ...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
Summarization: In recent years the advantages of reconfigurable computing have make FPGAs important ...
This thesis deals with the study of so-called mutating data paths and their utilization as a counter...
Since their publication in 1998, power analysis attacks have attracted significant attention within ...
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powe...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
Most of the countermeasures against fault attacks on cryptographic systems that have been developed ...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
In this work, the implementation of the PRESENT-80 block cipher in a 40nm CMOS technology, and its v...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
The robustness of a chip designed for security-related applications depends on its capability to glo...