Exploració 6th Conference on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2016), Barcelona, 14-16 November, 2016 per títol
Ara es mostren els items 1-20 de 43
-
A comparison of PUF cores suitable for FPGA devices
(2016-11-14)
Text en actes de congrés
Accés obertA PUF extracts a unique identifier per die using physical random variation caused by variability of the manufacturing process. PUFs can be used for hardware authentication, but also as generators of confidential keys. ... -
A Low-Cost Unified Experimental FPGA Board for Cryptography Applications
(2016-11-16)
Text en actes de congrés
Accés obertThis paper describes the evaluation of available experimental boards, the comparison of their supported set of experiments and other aspects. The second part of this evaluation is focused on the design process of the ... -
A Reliable Low-area Low-power PUF-based Key Generator
(2016-11-14)
Text en actes de congrés
Accés obertThis paper reports the implementation of a lowarea low-power 128-bit PUF-based key generation module which exploits a novel Two-Stage IDentification (TSID) cell showing a higher noise immunity then a standard SRAM cell. ... -
A Self-Repairable TRNG
(2016-11-14)
Text en actes de congrés
Accés obert -
Authentication of IC based on Electromagnetic Signature
(2016-11-14)
Text en actes de congrés
Accés obertIC Counterfeiting is becoming serious issue. The approach discussed here is to use Electromagnetic (EM) input to an IC and measure its EM input output response. The idea is to extract a signature from EM response which ... -
Circuit Clustering Methods for Netlist Reverse Engineering
(2016-11-16)
Text en actes de congrés
Accés restringit per acord de confidencialitat -
Committees
(2016-11-14)
Text en actes de congrés
Accés obert -
Dynamic Security-aware Routing for Zone-based data Protection in Multi-Processor System-on-Chips
(2016-11-16)
Text en actes de congrés
Accés obertIn this work, we propose a NoC which enforces the encapsulation of sensitive traffic inside the asymmetrical security zones while using minimal and non-minimal paths. The NoC routes guarantee that the sensitive traffic ... -
Electromagnetic Analysis Perturbation using Chaos Generator
(2016-11-14)
Text en actes de congrés
Accés obertCryptographic algorithms albeit mathematically sure may have security breaches when implemented on hardware chips. There are several ways to compromise their security, one method is to analyze their electromagnetic (EM) ... -
Evaluation of AIS-20/31 compliant TRNG cores implemented on FPGAs
(2016-11-14)
Text en actes de congrés
Accés obertFPGAs are widely used to integrate cryptographic primitives, algorithms, and protocols in cryptographic systemson- chip (CrySoC). As a building block of CrySoCs, True Random Number Generators (TRNGs) exploit analog noise ... -
Experimental results on smartcards’ IC EM radiation
(2016-11-15)
Text en actes de congrés
Accés obert -
Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags
(2016-11-14)
Text en actes de congrés
Accés obertIn this extended abstract a large-scale analysis of 4- way Arbiter PUFs is performed with measurement results from 1000 RFID tags. Arbiter PUFs are one of the most important building blocks in PUF-based protocols and ... -
Fault Injection on FPGA implementations of Trivium Stream Cipher using Clock Attacks
(2016-11-15)
Text en actes de congrés
Accés obert -
From Full-Custom to Fully-Standard Cell Power Analysis Countermeasures
(2016-11-16)
Text en actes de congrés
Accés obertSide-Channel Analysis (SCA) attacks have become one of the most significant problems in modern digital systems. These attacks exploit and misuse the information related to the physical behavior of cryptographic devices ... -
H.264 Motion Vectors Based Cyber Defense/Attack Techniques
(2016-11-15)
Text en actes de congrés
Accés obert -
Hiding Higher-Order Side-Channel Leakage – Randomizing Threshold Implementations in Reconfigurable Hardware –
(2016-11-15)
Text en actes de congrés
Accés restringit per acord de confidencialitat -
Influence of Fault-tolerant Design Methods on Resistance against Differential Power Analysis in FPGA
(2016-11-15)
Text en actes de congrés
Accés restringit per acord de confidencialitat -
Invited Speaker
(2016-11-16)
Text en actes de congrés
Accés obert -
Keynote Speech
(2016-11-14)
Text en actes de congrés
Accés obert -
Malware in IoT Software and Hardware
(2016-11-14)
Text en actes de congrés
Accés obert