International audienceCryptographic primitives such as True Random Number Generator (TRNG), Physical Unclonable Function (PUF) but also cryptographic algorithms need to be tested and evaluated in different technologies, but with identical system architecture and operating conditions in order to be fairly compared. The random data generated by a TRNG or responses of a PUF are strongly linked to the underlying technology, but also to the environment conditions (EMI, temperature, power supply voltage…). Similarly, success of the side channel attacks on cryptographic algorithms depends strongly on technology, system architecture and operating conditions. Most of FPGA families have their own evaluation boards developed by their constructors and ...
International audienceIn this paper, we describe the structure of a FPGAsmart card emulator. The aim...
In this work, we look into several aspects of hardware security. The major part of this thesis is de...
In the field of embedded systems design, coprocessors play an important role as a component to incre...
International audienceCryptographic primitives such as True Random Number Generator (TRNG), Physical...
Implementation of cryptographic primitives like Physical Unclonable Functions (PUFs) and True Rando...
True Random Number Generators (TRNG) are cryptographic primitives that exploit intrinsic noise sourc...
International audienceTrue Random Number Generators (TRNG) are cryptographic primitives that exploit...
This paper deals with an evaluation platform for cryptographic True Random Number Generators (TRNGs)...
True Random Number Generators (TRNGs) and Physical Unclonable Functions (PUFs) are two important typ...
International audienceFPGAs are primarily digital devices and application designers have to follow t...
This paper describes the evaluation of available experimental boards, the comparison of their suppo...
FPGAs are widely used to integrate cryptographic primitives, algorithms, and protocols in cryptograp...
Randomness is at the core of many cryptographic implementations. True random number generators provi...
FPGAs are widely used to integrate cryptographic primitives, algorithms, and protocols in cryptograp...
International audienceIn this paper, we describe the structure of a FPGAsmart card emulator. The aim...
In this work, we look into several aspects of hardware security. The major part of this thesis is de...
In the field of embedded systems design, coprocessors play an important role as a component to incre...
International audienceCryptographic primitives such as True Random Number Generator (TRNG), Physical...
Implementation of cryptographic primitives like Physical Unclonable Functions (PUFs) and True Rando...
True Random Number Generators (TRNG) are cryptographic primitives that exploit intrinsic noise sourc...
International audienceTrue Random Number Generators (TRNG) are cryptographic primitives that exploit...
This paper deals with an evaluation platform for cryptographic True Random Number Generators (TRNGs)...
True Random Number Generators (TRNGs) and Physical Unclonable Functions (PUFs) are two important typ...
International audienceFPGAs are primarily digital devices and application designers have to follow t...
This paper describes the evaluation of available experimental boards, the comparison of their suppo...
FPGAs are widely used to integrate cryptographic primitives, algorithms, and protocols in cryptograp...
Randomness is at the core of many cryptographic implementations. True random number generators provi...
FPGAs are widely used to integrate cryptographic primitives, algorithms, and protocols in cryptograp...
International audienceIn this paper, we describe the structure of a FPGAsmart card emulator. The aim...
In this work, we look into several aspects of hardware security. The major part of this thesis is de...
In the field of embedded systems design, coprocessors play an important role as a component to incre...