Zobrazeno 1 - 10
of 422
pro vyhledávání: '"Ingrid Verbauwhede"'
Autor:
Adriaan Peetermans, Ingrid Verbauwhede
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Flicker Frequency Modulated (FM) noise, which influences free-running Ring Oscillators (ROs), can make a substantial contribution to the entropy generated by RO-based True Random Number Generators (TRNGs). While current TRNG stochastic models predomi
Externí odkaz:
https://doaj.org/article/5bbcb9eadb3444d18f36fa472809f223
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
We present a novel approach to small area and low-latency first-order masking in hardware. The core idea is to separate the processing of shares in time in order to achieve non-completeness. Resulting circuits are proven first-order glitchextended PI
Externí odkaz:
https://doaj.org/article/dcbe847270be4be9beb91c7d85637d77
Autor:
Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with errors (LWE) problem, have been subjected to several physical attacks in the recent past. Although the attacks broadly belong to two classes – passive side-cha
Externí odkaz:
https://doaj.org/article/512e4f0757904f7383ace71b656f5a39
Autor:
Liliya Kraleva, Mohammad Mahzoun, Raluca Posteuca, Dilara Toprakhisar, Tomer Ashur, Ingrid Verbauwhede
Publikováno v:
IEEE Open Journal of the Solid-State Circuits Society, Vol 3, Pp 32-40 (2023)
Physically unclonable functions (PUFs) are being proposed as a low-cost alternative to permanently store secret keys or provide device authentication without requiring nonvolatile memory, large e-fuses, or other dedicated processing steps. In the lit
Externí odkaz:
https://doaj.org/article/0237994a6f734c60a3501dce36c065f0
Autor:
Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality. We present BASALISC, an architecture family of hardware acceler
Externí odkaz:
https://doaj.org/article/ad97ff20864c4b7e9cceb6b4776a828c
Autor:
Adriaan Peetermans, Ingrid Verbauwhede
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
This paper proposes an energy and area efficient entropy source, suitable for true random number generation, accompanied with a stochastic model in a 28nm CMOS technology. The design uses a jitter pipelining architecture together with an increased ti
Externí odkaz:
https://doaj.org/article/c37b44e0ade145f3a1440c9759ae5aa4
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 2 (2022)
Checking the equality of two arrays is a crucial building block of the Fujisaki-Okamoto transformation, and as such it is used in several post-quantum key encapsulation mechanisms including Kyber and Saber. While this comparison operation is easy to
Externí odkaz:
https://doaj.org/article/08c69342dfce41e495774bff4246e0fe
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying structured lattice based cryptography. Its algorithmic properties and suitability for implementation on different compute platforms is an active area
Externí odkaz:
https://doaj.org/article/14960de09daa41c9ac5a32eb740c9297
Autor:
Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing rese
Externí odkaz:
https://doaj.org/article/3cfe8bdcb938402d9db6c5b9b93e3636
Autor:
Jens Trautmann, Arthur Beckers, Lennert Wouters, Stefan Wildermann, Ingrid Verbauwhede, Jürgen Teich
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
Locating a cryptographic operation in a side-channel trace, i.e. finding out where it is in the time domain, without having a template, can be a tedious task even for unprotected implementations. The sheer amount of data can be overwhelming. In a sim
Externí odkaz:
https://doaj.org/article/05196398c9a2470ba65a73ade5478921