Now showing items 1-20 of 60

    • A comparison of PUF cores suitable for FPGA devices 

      Mureddu, Ugo; Bossuet, Lilian; Fischer, Viktor (2016-11-14)
      Conference report
      Open Access
      A PUF extracts a unique identifier per die using physical random variation caused by variability of the manufacturing process. PUFs can be used for hardware authentication, but also as generators of confidential keys. ...
    • A Low-Cost Unified Experimental FPGA Board for Cryptography Applications 

      Bartík, Matěj; Buček, Jiří (2016-11-16)
      Conference report
      Open Access
      This paper describes the evaluation of available experimental boards, the comparison of their supported set of experiments and other aspects. The second part of this evaluation is focused on the design process of the ...
    • A Reliable Low-area Low-power PUF-based Key Generator 

      Böhm, Christoph; Bucci, Marco; Hofer, Maximilian; Luzzi, Raimondo (2016-11-14)
      Conference report
      Open Access
      This paper reports the implementation of a lowarea low-power 128-bit PUF-based key generation module which exploits a novel Two-Stage IDentification (TSID) cell showing a higher noise immunity then a standard SRAM cell. ...
    • A Self-Repairable TRNG 

      Martin, Honorio; Di Natale, Giorgio; Peris-Lopez, Pedro (2016-11-14)
      Conference report
      Open Access
    • Anàlisi, disseny i implementació d'un sistema de control d'accés a la xarxa cablejada de la FIB 

      Bellet Chacón, Oriol (Universitat Politècnica de Catalunya, 2011-10)
      Master thesis
      Open Access
      El projecte consisteix en l'anàlisi disseny i implementació d'un sistema de control d'accés a la xarxa cablejada de la FIB que permeti autenticar usuaris, definir el recursos de xarxa oferts a cada usuari en funció de la ...
    • Authentication of IC based on Electromagnetic Signature 

      Ahmed, Mosabbah Mushir; Hely, David; Siragusa, Romain; Barbot, Nicolas; Perret, Etienne (2016-11-14)
      Conference report
      Open Access
      IC Counterfeiting is becoming serious issue. The approach discussed here is to use Electromagnetic (EM) input to an IC and measure its EM input output response. The idea is to extract a signature from EM response which ...
    • Authentication system deployment throughout protected access (UTM) for the Wireless Network in a hotel chain 

      Escolà Henke, Jean Miquel (Universitat Politècnica de Catalunya, 2011-10-08)
      Bachelor thesis
      Open Access
      A Hotel chain distributed over Europe wishes to provide wireless access to Internet for the hosted customers and offer an integral security through a Unified Threat Management ( UTM ) The project will consist; in one hand, ...
    • Circuit Clustering Methods for Netlist Reverse Engineering 

      Baehr, Johanna; Tempelmeier, Michael (2016-11-16)
      Conference report
      Restricted access - confidentiality agreement
    • Committees 

      Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica (2016-11-14)
      Conference report
      Open Access
    • Connected graph searching 

      Barrière Figueroa, Eulalia; Flocchini, Paola; Fomin, Fedor V.; Fraigniaud, Pierre; Nisse, Nicolas; Santoro, Nicola; Thilikos Touloupas, Dimitrios (2010-09-26)
      External research report
      Open Access
      In graph searching game the opponents are a set of searchers and a fugitive in a graph. The searchers try to capture the fugitive by applying some sequence moves that include placement, removal, or sliding of a searcher ...
    • Detect and visualize vulnerable systems using active vulnerability scans 

      Garralaga Alvarez, Mikel (Universitat Politècnica de Catalunya, 2019-02-26)
      Bachelor thesis
      Open Access
      Covenantee:   Hochschule für Angewandte Wissenschaften Hamburg
      Cyber Threat Intelligence helps organisations to improve their security and protect against threats and attacks. The main basis of CTI is the collection and management of information. However, it is really hard to manage ...
    • Disaster recovery 

      León Anglès, Núria (Factoria BCBL, 2011-05-02)
      Audiovisual
      Open Access
    • Dynamic Security-aware Routing for Zone-based data Protection in Multi-Processor System-on-Chips 

      Sepulveda, Johanna; Fernandes, Ramon; Florez, Daniel; Marcon, Cesar; Sigl, Georg (2016-11-16)
      Conference report
      Open Access
      In this work, we propose a NoC which enforces the encapsulation of sensitive traffic inside the asymmetrical security zones while using minimal and non-minimal paths. The NoC routes guarantee that the sensitive traffic ...
    • Electromagnetic Analysis Perturbation using Chaos Generator 

      Sarno, Thomas; Wacquez, Romain; Kussener, Edith; Maurine, Philippe; Jradi, Khalil; Portal, Jean-Michel; Aboulkassimi, Driss; Souiki-Figuigui, Sarra; Postel-Pellerin, Jeremy; Canet, Pierre; Chambonnea, Maxime; Grojo, David (2016-11-14)
      Conference report
      Open Access
      Cryptographic algorithms albeit mathematically sure may have security breaches when implemented on hardware chips. There are several ways to compromise their security, one method is to analyze their electromagnetic (EM) ...
    • Estudio de IPsec - Proyecto de una API_IPsec para la movilidad y el multihoming 

      Ferrer Caballero, Xavier (Universitat Politècnica de Catalunya, 2009-02-12)
      Master thesis (pre-Bologna period)
      Open Access
      En vue du contexte, des motivations et problématiques antérieures, les objectifs principaux sont : - Définition de l'API_IPsec, et de ses interfaces et de sa base de données o Fournir de primitives qui permettent de gérer ...
    • Evaluation of AIS-20/31 compliant TRNG cores implemented on FPGAs 

      Petura, Oto; Mureddu, Ugo; Bochard, Nathalie; Fischer, Viktor; Bossuet, Lilian (2016-11-14)
      Conference report
      Open Access
      FPGAs are widely used to integrate cryptographic primitives, algorithms, and protocols in cryptographic systemson- chip (CrySoC). As a building block of CrySoCs, True Random Number Generators (TRNGs) exploit analog noise ...
    • Experimental results on smartcards’ IC EM radiation 

      Mendo, N.; Nuevo, R.; Hernández, D. (2016-11-15)
      Conference report
      Open Access
    • Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags 

      Utz, Christine; Tobisch, Johannes; Becker, Georg T. (2016-11-14)
      Conference report
      Open Access
      In this extended abstract a large-scale analysis of 4- way Arbiter PUFs is performed with measurement results from 1000 RFID tags. Arbiter PUFs are one of the most important building blocks in PUF-based protocols and ...
    • Fault Injection on FPGA implementations of Trivium Stream Cipher using Clock Attacks 

      Potestad-Ordóñez, F.E.; Jiménez-Fernández, C.J.; Valencia-Barrero, M. (2016-11-15)
      Conference report
      Open Access
    • From Full-Custom to Fully-Standard Cell Power Analysis Countermeasures 

      Avital, Moshe; Fish, Alexander; Keren, Osnat (2016-11-16)
      Conference report
      Open Access
      Side-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digital systems. These attacks exploit and misuse the information related to the physical behavior of cryptographic devices ...