Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
633 results
-
-
Seminar
-
SemSecuElec
True Random Number Generators enabled hardware security
Speaker : Bohan Yang
True randomness is all about unpredictability, which can neither be qualified nor quantified by examining statistics of a sequence of digits. Unpredictability is a property of random phenomena, which is measured in bits of information entropy. Application of randomness spans from art to numerical computing and system security. Random numbers enable various cryptographic algorithms, protocols and[…] -
-
-
Seminar
-
SemSecuElec
Post-Quantum Cryptography Hardware: Monolithic Implementations vs. Hardware-Software Co-Design
Speaker : Markku-Juhani Saarinen
At PQShield, we’ve developed dedicated coprocessor(s) for lattice schemes, hash-based signatures, and code-based cryptography. These cryptographic modules are commercial rather than academic and designed to meet customer specifications such as a specific performance profile or Common Criteria and FIPS security certification requirements.Hardware implementations of legacy RSA and Elliptic Curve[…] -
-
-
Seminar
-
SemSecuElec
Security challenges and opportunities in emerging device technologies: a case study on flexible electronics
Speaker : Nele Mentens - KU Leuven, Belgium
While traditional chips in bulk silicon technology are widely used for reliable and highly ef?cient systems, there are applications that call for devices in other technologies. On the one hand, novel device technologies need to be re-evaluated with respect to potential threats and attacks, and how these can be faced with existing and novel security solutions and methods. On the other hand,[…] -
-
-
Seminar
-
SemSecuElec
Automated software protection for the masses against side-channel attacks
Speaker : Nicolas Belleville
This presentation will present an approach and a tool that answer the need for effective, generic, and easily applicable protections against side-channel attacks. The protection mechanism is based on code polymorphism, so that the observable behaviour of the protected component is variable and unpredictable to the attacker. Our approach combines lightweight specialized runtime code generation with[…] -
-
-
Seminar
-
SemSecuElec
Cryptographie légère intrinsèquement résistante aux attaques physiques pour l’Internet des Objets
Speaker : Benjamin Lac
Avec des applications telles que les smart phones , compteurs intelligents, capteurs et autres systèmes industriels de type SCADA, le nombre d objets connectés à Internet atteindrait les 20 milliards d ici 2020. Les contraintes de taille, coût et consommation ainsi que les problématiques de sécurité liées au déploiement de ces objets à si grande échelle ont mené à la conception de systèmes de[…] -
-
-
Seminar
-
SemSecuElec
libecc: a flexible open-source ECC library for embedded devices
Speaker : Ryad Benadjila et Arnaud Ebalard
libecc is a software library for elliptic curves based cryptography (ECC), with an API supporting signature algorithms specified in the ISO14888-3 standard.Advanced usages of this library also include the possible implementation of elliptic curve based Diffie-Hellman protocols as well as any algorithm on top of prime fields based elliptic curves (or prime fields, or rings of integers).The[…] -