Cybersecurity is a crucial component of the digital ecosystem in Europe, being fortified by global organizations like the NIST through strategies to prevent cyber attacks and information leakages. The Root-of-Trust in cybersecurity, tied to the CIA Triad principles, creates a secure computing environment using hardware, firmware, and software...
-
May 20, 2024 (v1)PublicationUploaded on: April 4, 2025
-
February 2, 2022 (v1)Publication
Improving the security of electronic devices that support innovative critical services (digital administrative services, e-health, e-shopping, and on-line banking) is essential to lay the foundations of a secure digital society. Security schemes based on Physical Unclonable Functions (PUFs) take advantage of intrinsic characteristics of the...
Uploaded on: December 4, 2022 -
January 19, 2023 (v1)Publication
This work presents a unified framework to design, implement and evaluate the performance of Ring Oscillator Physical Unclonable Functions (RO PUFs) on FPGAs. The design flow uses a Digital Signal Processing (DSP) tool integrated into the Matlab environment. The use of this tool eases the evaluation of the PUF performance. The DSP tool provides...
Uploaded on: February 23, 2023 -
March 18, 2022 (v1)Publication
Concern for the security of embedded systems that implement IoT devices has become a crucial issue, as these devices today support an increasing number of applications and services that store and exchange information whose integrity, privacy, and authenticity must be adequately guaranteed. Modern lattice-based cryptographic schemes have proven...
Uploaded on: March 25, 2023 -
August 4, 2023 (v1)Publication
The generation of unique identifiers extracted from the physical characteristics of the underlying hardware ensures the protection of electronic devices against counterfeiting and provides security to the data they store and process. This work describes the design of an efficient Physical Unclonable Function (PUF) based on the differences in...
Uploaded on: October 18, 2023 -
January 18, 2024 (v1)Publication
As quantum computing technology advances, the security of traditional cryptographic systems is becoming increasingly vulnerable. To address this issue, Post-Quantum Cryptography (PQC) has emerged as a promising solution that can withstand the brute force of quantum computers. However, PQC is not immune to attacks that exploit weaknesses in...
Uploaded on: January 20, 2024