Aportación a congreso RISC-V Summit 2023This work presents the design and validation of a compact and efficient RO-PUF/TRNG module, which combines ID generation and entropy source functionalities, and can be used as an essential primitive of a hardware RoT for RISC-V based SoCs. The design was encapsulated as an IP core to provide it with a high level of configurability, flexibility, and reusability. A comprehensive SDK for online characterization, validation, and performance monitoring of PUF and TRNG quality metrics was also developed. The experimental results show that the proposed RO-PUF/TRNG IP is suitable for increasing the security of IoT applications.This research was supported in part by the SPIRS Project with Grant Agreement No. 9...
Cybersecurity is an increasingly important aspect of the modern world since most of the communicatio...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
This paper presents a novel security mechanism for sensitive data stored, acquired or processed by a...
Aportación a congreso RISC-V Summit 2023This work presents the design and validation of a compact an...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
Improving the security of electronic devices that support innovative critical services (digital admi...
The integration of multicore processors and peripherals from multiple intellectual property core pro...
International audienceWe discuss the interest of using both TRNG and PUF to enhance the security of ...
This article belongs to the Special Issue Emerging Trends on Physical Security.The generation of uni...
As Internet of Things (IoT) devices are increasingly used in industry and become further integrated ...
Silicon physical unclonable functions (sPUFs) exploit manufacturing process variations of semiconduc...
Silicon physical unclonable functions (sPUFs) exploit manufacturing process variations of semiconduc...
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardwa...
The RISC-V True Random Number Generator (TRNG) architecture breaks with previous ISA TRNG practice b...
Improving the security of electronic devices that support innovative critical services (digital admi...
Cybersecurity is an increasingly important aspect of the modern world since most of the communicatio...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
This paper presents a novel security mechanism for sensitive data stored, acquired or processed by a...
Aportación a congreso RISC-V Summit 2023This work presents the design and validation of a compact an...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
Improving the security of electronic devices that support innovative critical services (digital admi...
The integration of multicore processors and peripherals from multiple intellectual property core pro...
International audienceWe discuss the interest of using both TRNG and PUF to enhance the security of ...
This article belongs to the Special Issue Emerging Trends on Physical Security.The generation of uni...
As Internet of Things (IoT) devices are increasingly used in industry and become further integrated ...
Silicon physical unclonable functions (sPUFs) exploit manufacturing process variations of semiconduc...
Silicon physical unclonable functions (sPUFs) exploit manufacturing process variations of semiconduc...
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardwa...
The RISC-V True Random Number Generator (TRNG) architecture breaks with previous ISA TRNG practice b...
Improving the security of electronic devices that support innovative critical services (digital admi...
Cybersecurity is an increasingly important aspect of the modern world since most of the communicatio...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
This paper presents a novel security mechanism for sensitive data stored, acquired or processed by a...