Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Banerjee, Utsav"'
Quantum computing has proven to be capable of accelerating many algorithms by performing tasks that classical computers cannot. Currently, Noisy Intermediate Scale Quantum (NISQ) machines struggle from scalability and noise issues to render a commerc
Externí odkaz:
http://arxiv.org/abs/2309.10728
Autor:
Banerjee, Utsav
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic devices which are always collecting, processing and communicating data. While the IoT has inspired many new applications, these embedded devices have un
We demonstrate the extraction of an AES secret key from flash memory on the ATMega328 microcontroller (the microcontroller used on the popular Arduino Genuino/Uno board). We loaded a standard AVR-architecture AES-128 implementation onto the chip and
Externí odkaz:
http://arxiv.org/abs/2203.08220
We present the first BLS12-381 elliptic curve pairing crypto-processor for Internet-of-Things (IoT) security applications. Efficient finite field arithmetic and algorithm-architecture co-optimizations together enable two orders of magnitude energy sa
Externí odkaz:
http://arxiv.org/abs/2201.07496
Publikováno v:
IEEE Internet of Things Journal, 2021
With the recent advancements in machine learning theory, many commercial embedded micro-processors use neural network models for a variety of signal processing applications. However, their associated side-channel security vulnerabilities pose a major
Externí odkaz:
http://arxiv.org/abs/2103.14739
Autor:
Maji, Saurav, Banerjee, Utsav, Fuller, Samuel H, Abdelhamid, Mohamed R, Nadeau, Phillip M, Yazicigil, Rabia Tugce, Chandrakasan, Anantha P
This paper presents a dual-factor authentication protocol and its low-power implementation for security of implantable medical devices (IMDs). The protocol incorporates traditional cryptographic first-factor authentication using Datagram Transport La
Externí odkaz:
http://arxiv.org/abs/2004.13709
Publikováno v:
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(4), pp. 17-61
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor's algorithm when large-scale quantum computers are built. Cryptographers are working on quantum-resistant algorithms, and lattice-based
Externí odkaz:
http://arxiv.org/abs/1910.07557
Autor:
Banerjee, Utsav, Wright, Andrew, Juvekar, Chiraag, Waller, Madeleine, Arvind, Chandrakasan, Anantha P.
This paper presents the first hardware implementation of the Datagram Transport Layer Security (DTLS) protocol to enable end-to-end security for the Internet of Things (IoT). A key component of this design is a reconfigurable prime field elliptic cur
Externí odkaz:
http://arxiv.org/abs/1907.04455
This paper presents a configurable lattice cryptography processor which enables quantum-resistant security protocols for IoT. Efficient sampling architectures, coupled with a low-power SHA-3 core, provide two orders of magnitude energy savings over s
Externí odkaz:
http://arxiv.org/abs/1903.04570
This paper presents a reconfigurable cryptographic engine that implements the DTLS protocol to enable end-to-end security for IoT. This implementation of the DTLS engine demonstrates 10x reduction in code size and 438x improvement in energy-efficienc
Externí odkaz:
http://arxiv.org/abs/1903.04387