Now showing items 1-20 of 60

  • A comparison of PUF cores suitable for FPGA devices 

    Mureddu, Ugo; Bossuet, Lilian; Fischer, Viktor (2016-11-14)
    Conference report
    Open Access
    A PUF extracts a unique identifier per die using physical random variation caused by variability of the manufacturing process. PUFs can be used for hardware authentication, but also as generators of confidential keys. ...
  • A Low-Cost Unified Experimental FPGA Board for Cryptography Applications 

    Bartík, Matěj; Buček, Jiří (2016-11-16)
    Conference report
    Open Access
    This paper describes the evaluation of available experimental boards, the comparison of their supported set of experiments and other aspects. The second part of this evaluation is focused on the design process of the ...
  • Anàlisi, disseny i implementació d'un sistema de control d'accés a la xarxa cablejada de la FIB 

    Bellet Chacón, Oriol (Universitat Politècnica de Catalunya, 2011-10)
    Master thesis
    Open Access
    El projecte consisteix en l'anàlisi disseny i implementació d'un sistema de control d'accés a la xarxa cablejada de la FIB que permeti autenticar usuaris, definir el recursos de xarxa oferts a cada usuari en funció de la ...
  • A Reliable Low-area Low-power PUF-based Key Generator 

    Böhm, Christoph; Bucci, Marco; Hofer, Maximilian; Luzzi, Raimondo (2016-11-14)
    Conference report
    Open Access
    This paper reports the implementation of a lowarea low-power 128-bit PUF-based key generation module which exploits a novel Two-Stage IDentification (TSID) cell showing a higher noise immunity then a standard SRAM cell. ...
  • A Self-Repairable TRNG 

    Martin, Honorio; Di Natale, Giorgio; Peris-Lopez, Pedro (2016-11-14)
    Conference report
    Open Access
  • Authentication of IC based on Electromagnetic Signature 

    Ahmed, Mosabbah Mushir; Hely, David; Siragusa, Romain; Barbot, Nicolas; Perret, Etienne (2016-11-14)
    Conference report
    Open Access
    IC Counterfeiting is becoming serious issue. The approach discussed here is to use Electromagnetic (EM) input to an IC and measure its EM input output response. The idea is to extract a signature from EM response which ...
  • Authentication system deployment throughout protected access (UTM) for the Wireless Network in a hotel chain 

    Escolà Henke, Jean Miquel (Universitat Politècnica de Catalunya, 2011-10-08)
    Bachelor thesis
    Open Access
    A Hotel chain distributed over Europe wishes to provide wireless access to Internet for the hosted customers and offer an integral security through a Unified Threat Management ( UTM ) The project will consist; in one hand, ...
  • Circuit Clustering Methods for Netlist Reverse Engineering 

    Baehr, Johanna; Tempelmeier, Michael (2016-11-16)
    Conference report
    Restricted access - confidentiality agreement
  • Committees 

    Departament d'Enginyeria Electrònica (2016-11-14)
    Conference report
    Open Access
  • Connected graph searching 

    Barrière Figueroa, Eulalia; Flocchini, Paola; Fomin, Fedor V.; Fraigniaud, Pierre; Nisse, Nicolas; Santoro, Nicola; Thilikos Touloupas, Dimitrios (2010-09-26)
    External research report
    Open Access
    In graph searching game the opponents are a set of searchers and a fugitive in a graph. The searchers try to capture the fugitive by applying some sequence moves that include placement, removal, or sliding of a searcher ...
  • Detect and visualize vulnerable systems using active vulnerability scans 

    Garralaga Alvarez, Mikel (Universitat Politècnica de Catalunya, 2019-02-26)
    Bachelor thesis
    Open Access
    Covenantee:  Hochschule für Angewandte Wissenschaften Hamburg
    Cyber Threat Intelligence helps organisations to improve their security and protect against threats and attacks. The main basis of CTI is the collection and management of information. However, it is really hard to manage ...
  • Disaster recovery 

    León Anglès, Núria (Factoria BCBL, 2011-05-02)
    Audiovisual
    Open Access
  • Dynamic Security-aware Routing for Zone-based data Protection in Multi-Processor System-on-Chips 

    Sepulveda, Johanna; Fernandes, Ramon; Florez, Daniel; Marcon, Cesar; Sigl, Georg (2016-11-16)
    Conference report
    Open Access
    In this work, we propose a NoC which enforces the encapsulation of sensitive traffic inside the asymmetrical security zones while using minimal and non-minimal paths. The NoC routes guarantee that the sensitive traffic ...
  • Electromagnetic Analysis Perturbation using Chaos Generator 

    Sarno, Thomas; Wacquez, Romain; Kussener, Edith; Maurine, Philippe; Jradi, Khalil; Portal, Jean-Michel; Aboulkassimi, Driss; Souiki-Figuigui, Sarra; Postel-Pellerin, Jeremy; Canet, Pierre; Chambonnea, Maxime; Grojo, David (2016-11-14)
    Conference report
    Open Access
    Cryptographic algorithms albeit mathematically sure may have security breaches when implemented on hardware chips. There are several ways to compromise their security, one method is to analyze their electromagnetic (EM) ...
  • Estudio de IPsec - Proyecto de una API_IPsec para la movilidad y el multihoming 

    Ferrer Caballero, Xavier (Universitat Politècnica de Catalunya, 2009-02-12)
    Master thesis (pre-Bologna period)
    Open Access
    En vue du contexte, des motivations et problématiques antérieures, les objectifs principaux sont : - Définition de l'API_IPsec, et de ses interfaces et de sa base de données o Fournir de primitives qui permettent de gérer ...
  • Evaluation of AIS-20/31 compliant TRNG cores implemented on FPGAs 

    Petura, Oto; Mureddu, Ugo; Bochard, Nathalie; Fischer, Viktor; Bossuet, Lilian (2016-11-14)
    Conference report
    Open Access
    FPGAs are widely used to integrate cryptographic primitives, algorithms, and protocols in cryptographic systemson- chip (CrySoC). As a building block of CrySoCs, True Random Number Generators (TRNGs) exploit analog noise ...
  • Experimental results on smartcards’ IC EM radiation 

    Mendo, N.; Nuevo, R.; Hernández, D. (2016-11-15)
    Conference report
    Open Access
  • Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags 

    Utz, Christine; Tobisch, Johannes; Becker, Georg T. (2016-11-14)
    Conference report
    Open Access
    In this extended abstract a large-scale analysis of 4- way Arbiter PUFs is performed with measurement results from 1000 RFID tags. Arbiter PUFs are one of the most important building blocks in PUF-based protocols and ...
  • Fault Injection on FPGA implementations of Trivium Stream Cipher using Clock Attacks 

    Potestad-Ordóñez, F.E.; Jiménez-Fernández, C.J.; Valencia-Barrero, M. (2016-11-15)
    Conference report
    Open Access
  • From Full-Custom to Fully-Standard Cell Power Analysis Countermeasures 

    Avital, Moshe; Fish, Alexander; Keren, Osnat (2016-11-16)
    Conference report
    Open Access
    Side-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digital systems. These attacks exploit and misuse the information related to the physical behavior of cryptographic devices ...