International audienceThis article presents an FPGA tech-mapping algorithm dedicated to security applications. The objective is to implement -on a full-custom asynchronous FPGA- secured functions that need to be robust against sidechannel attacks (SCAs). The paper briefly describes the architecture of this FPGA that has been designed and prototyped in CMOS 65 nm to target various styles of asynchronous logic including 2-phase and 4-phase communication protocols and 1-of-N data encoding. This programmable architecture is designed to be electrically balanced in order to fit the security requirements. It allows fair comparisons between different styles of asynchronous implementations. In order to illustrate the FPGA flexibility and security, a...
International audienceThis paper presents the first study of an asynchronous AES architecture comp...
The last 30 years have seen an increase in the complexity of embedded systems from a collection of s...
ISBN 2-9517-4611-3This paper describes a general methodology to prototype asynchronous systems onto ...
Abstract—This article presents an asynchronous FPGA architecture for implementing cryptographic algo...
International audienceThis article describes the design of a Programmable Logic Block (PLB) of a mul...
International audienceWith the growing security needs of applications such as homeland security or b...
Cryptographic devices are vulnerable to so-called Side Channel Attacks. As attackers become smarter,...
Cryptographic devices are vulnerable to so-called Side Channel At-tacks. As attackers become smarter...
This paper demonstrates a recently proposed low-power side channel attack (SCA) resistant asynchrono...
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
DES has been widely used in current financial security application, but side-channel attacks are con...
This article presents a security module based on a field programmable gate array (FPGA) to mitigate ...
La cryptologie est un moyen de protéger la confidentialité, d'assurer l'intégrité, ou d'authentifier...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
International audienceThis paper presents the first study of an asynchronous AES architecture comp...
The last 30 years have seen an increase in the complexity of embedded systems from a collection of s...
ISBN 2-9517-4611-3This paper describes a general methodology to prototype asynchronous systems onto ...
Abstract—This article presents an asynchronous FPGA architecture for implementing cryptographic algo...
International audienceThis article describes the design of a Programmable Logic Block (PLB) of a mul...
International audienceWith the growing security needs of applications such as homeland security or b...
Cryptographic devices are vulnerable to so-called Side Channel Attacks. As attackers become smarter,...
Cryptographic devices are vulnerable to so-called Side Channel At-tacks. As attackers become smarter...
This paper demonstrates a recently proposed low-power side channel attack (SCA) resistant asynchrono...
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer...
Abstract—Side Channel Attacks (SCAs) have proven to be very effective in extracting information from...
DES has been widely used in current financial security application, but side-channel attacks are con...
This article presents a security module based on a field programmable gate array (FPGA) to mitigate ...
La cryptologie est un moyen de protéger la confidentialité, d'assurer l'intégrité, ou d'authentifier...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
International audienceThis paper presents the first study of an asynchronous AES architecture comp...
The last 30 years have seen an increase in the complexity of embedded systems from a collection of s...
ISBN 2-9517-4611-3This paper describes a general methodology to prototype asynchronous systems onto ...