Nowadays security is a major concern for the entire computer industry. Our lives are deeply linked with the web: emails, calendar, messages and so on. This is a huge threat for our privacy, because without precautions all these information can be stolen and used against us. Moreover there is a trend, in the recent years, to make every device "smart". This creates other problems, because devices that were considered to be "secure" are no longer secure; Potentially an hacker could remotely turn on or off our home lights, or see what there is inside our fridge. A very important tool against all the aforementioned problems is cryptography; It can be used to protect data in three ways: confidentiality, authenticity and integrity. Ensuring these ...
This paper reports on the main research results achieved by the author, including activities carried...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
Contains fulltext : 239208.pdf (Publisher’s version ) (Open Access)Cryptographic p...
Cybercrime is a serious social problem. Data security threats affect not only large financial organi...
This work illustrates the research activities related to the implementation of a suite of hardware c...
Securing data in the evermore networked world of today, is a profound necessity that is embraced by ...
International audienceEmbedded systems have to increasingly support cryptographic primitives such as...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
Hardware security is becoming increasingly important for many embedded systems applications ranging ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceHardware Engines for Bus Encryption: a Survey of Existing Technique
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
In the Internet of Things (IoT), many strong constraints have to be considered when designing the co...
Kiamilev, FouadRecent trends in technology have pushed the majority of ASIC fabrication overseas. Th...
This paper reports on the main research results achieved by the author, including activities carried...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
Contains fulltext : 239208.pdf (Publisher’s version ) (Open Access)Cryptographic p...
Cybercrime is a serious social problem. Data security threats affect not only large financial organi...
This work illustrates the research activities related to the implementation of a suite of hardware c...
Securing data in the evermore networked world of today, is a profound necessity that is embraced by ...
International audienceEmbedded systems have to increasingly support cryptographic primitives such as...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
Hardware security is becoming increasingly important for many embedded systems applications ranging ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceHardware Engines for Bus Encryption: a Survey of Existing Technique
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
The advent of the Internet of things has revolutionized the way we view the infrastructure of inform...
In the Internet of Things (IoT), many strong constraints have to be considered when designing the co...
Kiamilev, FouadRecent trends in technology have pushed the majority of ASIC fabrication overseas. Th...
This paper reports on the main research results achieved by the author, including activities carried...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
Contains fulltext : 239208.pdf (Publisher’s version ) (Open Access)Cryptographic p...