- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Chaos-based Image/Signal Encryption
- Security and Verification in Computing
- Cryptography and Residue Arithmetic
- Coding theory and cryptography
- Cryptography and Data Security
- Advanced Malware Detection Techniques
- Interconnection Networks and Systems
- Quantum Computing Algorithms and Architecture
- Embedded Systems Design Techniques
- Quantum-Dot Cellular Automata
- Mechatronics Education and Applications
- VLSI and FPGA Design Techniques
- Security in Wireless Sensor Networks
- Low-power high-performance VLSI design
- Robotic Mechanisms and Dynamics
- Modular Robots and Swarm Intelligence
- VLSI and Analog Circuit Testing
Universitat Rovira i Virgili
2024
Laboratoire Hubert Curien
2022-2024
Centre National de la Recherche Scientifique
2022-2024
Université Claude Bernard Lyon 1
2023
Université Jean Monnet
2022-2023
Center for Research and Advanced Studies of the National Polytechnic Institute
2014-2021
Instituto Politécnico Nacional
2014-2021
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, generation, security proofs, point representation, algorithms for inherent arithmetic the underlying algebraic structures, implementation strategies both software hardware, attack models, among others. The main advantage ECC is that shorter keys (less-memory requirements faster field...
In recent years, the study of lightweight symmetric ciphers has gained interest due to increasing demand for security services in constrained computing environments, such as Internet Things. However, when there are several algorithms choose from and different implementation criteria conditions, it becomes hard select most adequate primitive a specific application. This paper discusses hardware implementations Present, standardized cipher called overcome part issues extremely environments....
This paper presents a novel FPGA-based design for the lightweight block cipher PRESENT and its implementation results. The proposed allows to study area-performance trade-offs thus constructing smaller or faster implementations. When optimized by area, exhibits latency fewer FPGA resources than representative related works in literature.
In this work we present a study that evaluates and compares two block ciphers, AES PRESENT, in the context of lightweight cryptography for smartphones security applications. To best our knowledge, is first comparison between these ciphers using smartphone as computing platform. standard symmetric encryption PRESENT one ultra-lightweight proposed literature included ISO/IEC 29192-2. study, consider execution time, voltage consumption memory usage metrics purposes. The were evaluated through...
This paper presents hardware realizations of two lightweight hash function families on FPGA: spongent and LHash. The assessment provided for both cryptographic primitives is in terms area, performance, energy consumption, when implemented LUT-4 LUT-6 FPGA technology equivalent security levels. To the best our knowledge, this reports most compact implementation first
Wireless Sensor Networks (WSN) aim at linking the cyber and physical worlds. Their security has taken relevance due to sensitive data these networks might process under unprotected cybernetic environments. The operational constraints in sensor nodes demand primitives with small implementation size low power consumption. Authenticated encryption is a mechanism provide systems confidentiality, integrity, authentication of data. In this paper we explore hardware alternatives authenticated...
Making Elliptic Curve Cryptography (ECC) available for the Internet of Things (IoT) and related technologies is a recent topic interest. Modern IoT applications transfer sensitive information which needs to be protected. This difficult task due processing power memory availability constraints physical devices. ECC mainly relies on scalar multiplication (kP)-which an operation-intensive procedure. The broad majority kP proposals in literature focus performance improvements often overlook...
Modern SoCs can be protected against software attacks under the paradigm of secure enclaves, which are built employing technologies like ARM TrustZone. These protections meant to enforce access policies so that interaction between untrusted/trusted applications and hardware components is limited. However, possibility creating covert channels within SoC threatens these isolation models. Among other approaches, it has been shown possible create by exploiting frequency-modulation technology...
Side channel attacks (SCA) have the potential of disrupting trust users on computing platforms and cryptographic algorithms. The main challenge in design countermeasures against such threats is that an evaluation their effectiveness can only be performed after they been implemented. By point, significant resources would invested creation a prototype. Moreover, large volume combinations from all target algorithms systems complicates systematical analysis. It necessary to find strategies...
This paper presents the development of a field-programmable gate array (FPGA)-based platform. platform is intended for community as an educational and efficient prototyping tool, in digital signal processing, robotics, control, but it can also be used to develop custom robotic architectures. The proposed centered around FPGA device embedded on off-the-shelf Phoenix hexapod robot. equipped with camera module targeted real time computer vision. From academic point view, main use developed...
Over the years, important breakthroughs have been made in protecting data at rest or in-transit. The emergence of Internet Things (IoT) and Cyber Physical Systems (CPS) has pose new challenges for systems devices tightly close to humans. Embedded with constrained computing capabilities are a central part IoT CPS, susceptible different security attacks vulnerabilities. Lightweight cryptography is term used grouping cryptographic algorithms techniques tailored observe requirements such...
In recent years, the field of side-channel analysis has observed a revolution in design attack methodology. Conventional approaches which require use highly specialized equipment like oscilloscopes and spectrum analyzers, despite precise, might be regarded as impractical some scenarios. On other hand, less-accurate internal sensors can monitor power footprint circuit risen popularity. Delay have shown promising results. These structures are interesting since they implemented from regular...
Recent works have highlighted the vulnerability of System-on-a-Chip (SoC) platforms against frequency-based covert channels. An attacker might be able to leverage vulnerabilities in SoC's firmware, operating system, or design tools gain access underlying hardware and perform frequency modulation. Given diversity threats constant evolution SoC platforms, it is not practical study this attack model using physical devices. To address issue, we propose employ advanced simulation techniques. Our...
Traditionally, there have been two main obstacles for practical power analysis attacks: the adversary needed physical access to device, and they had use sophisticated sensing equipment obtain samples. However, it is now known that an attacker may leverage remote platform internal sensors perform attacks. Internal are circuits created from components native example reconfigurable fabric in some heterogeneous SoCs. Now, drawbacks of these their large sizes require precise placement improve...
In recent years, heterogeneous SoCs-comprised of multiple processor cores and programmable logic-have greatly progressed both complexity performance.From a security point view, this leads to an expansion the attack surface exposed adversaries.To address issue, in article, we propose novel SoC architecture called RTrustSoC.Our proposal includes innovative fully-reconfigurable postdeployment strategy for partitioning into exclusion levels-worlds-with customizable degrees privilege.We aim...
Recent works have highlighted the vulnerability of System-on-a-Chip (SoC) platforms against intrinsic channels attacks. In this threat model, an adversary can leverage vulnerabilities in SoC's firmware, operating system, or design tools to gain access shared resources platform and transfer data covertly. Given diversity attack avenues constant evolution heterogeneous SoCs, it is not practical study these attacks using conventional approaches. To address issue, we propose employ gem5 power...
In this paper we present two Lightweight Key Establishment (LKE) solutions for Wireless Sensor Networks (WSN). We explore area and energy oriented design goals. The protocol used in the LKE systems, relies on novel lightweight elliptic curve scalar multiplication architectures a block cipher. evaluate both FPGA using area, energy, performance metrics. Our main contributions are an area-oriented core with minimal size, energy-oriented variant which reduces profile by ~90% while maintaining...