- Cryptographic Implementations and Security
- Cryptography and Residue Arithmetic
- Physical Unclonable Functions (PUFs) and Hardware Security
- Coding theory and cryptography
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Security and Verification in Computing
- RFID technology advancements
- Network Security and Intrusion Detection
- Advanced Authentication Protocols Security
- Adversarial Robustness in Machine Learning
- Digital Media Forensic Detection
- User Authentication and Security Systems
- Integrated Circuits and Semiconductor Failure Analysis
- Smart Grid Security and Resilience
- Semiconductor materials and devices
- Advancements in Semiconductor Devices and Circuit Design
- Information and Cyber Security
- VLSI and Analog Circuit Testing
- Electrostatic Discharge in Electronics
- Privacy-Preserving Technologies in Data
- Low-power high-performance VLSI design
- DNA and Biological Computing
- Advanced Memory and Neural Computing
Radboud University Nijmegen
2016-2025
Delft University of Technology
2022
City University of Hong Kong
2020
National Technical University of Athens
2017
KU Leuven
2005-2014
iMinds
2013
State Key Laboratory of Cryptology
2011
RFID-tags are a new generation of bar-codes with added functionality. An emerging application is the use for anti-counterfeiting by embedding them into product. Public-key cryptography (PKC) offers an attractive solution to counterfeiting problem but whether publickey cryptosystem can be implemented on RFID tag or not remains unclear. In this paper, we investigate which PKC-based identification protocols useful these applications. We also discuss feasibility based elliptic curve (ECC) and...
Operational and security requirements for RFID systems such as system scalability, anonymity anti-cloning are difficult to obtain due constraints in area, memory, etc. Due scarceness of resources most the proposed protocols were designed using symmetric key cryptographic algorithms. However, it has been shown that is inevitable use public-key algorithms satisfy these [1]. Moreover, general cryptography based authentication vulnerable terms anonymity, which this paper. Accordingly, we design...
As devices move within a cellular network, they register their new location with cell base stations to allow for the correct forwarding of data. We show it is possible identify mobile user from these records and pre-existing profile, based on previous movement. Two different identification processes are studied, performances evaluated real traces. The best those allows around 80% users. also study misidentified users characterise them using hierarchical clustering techniques. Our findings...
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we address the risk tracking attacks in RFID networks. Our contribution is threefold: (1) We repair three revised EC-RAC protocols Lee, Batina and Verbauwhede show that two improved authentication are wide-strong privacy-preserving one wide-weak privacy-preserving; (2) present search protocol, a novel scheme which allows for privately querying particular tag, proof its security properties; (3)...
We describe a hardware implementation of an arithmetic processor which is efficient for bit-lengths suitable both commonly used types public key cryptography (PKC), i.e., elliptic curve (EC) and RSA cryptosystems. Montgomery modular multiplication in systolic array architecture multiplication. The consists special operational blocks multiplication, addition/subtraction, EC point doubling/addition, multiplicative inversion, multiplier, projective to affine coordinates conversion normal...
Radio Frequency IDentiflcation (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials improve our lives, also present a privacy risk. Privacy is often overlooked in many applications, but pervasiveness of RFIDs the issue has be taken into account. However, additional security always comes at price and scarceness resources on tag makes conventional...