A diario personas de todo el mundo hacen uso de dispositivos electrónicos en los que almacenan o con los que intercambian información privada. La confidencialidad y privacidad es un derecho frente a posibles intrusos, por lo que la seguridad en las nuevas tecnologías es un factor de transcendental importancia que exige la atención de la...
-
March 18, 2019 (v1)PublicationUploaded on: December 4, 2022
-
June 8, 2022 (v1)PublicationPuesta en común y fomento de la exposición de aplicaciones reales en los laboratorios de electrónica
El ciclo de mejora en el aula presentado en este capítulo se ha desarrollado en la asignatura de Acondicionamiento y Conversión de Señales del Grado de Ingeniería Electrónica Industrial impartido en la Escuela Politécnica Superior de la Universidad de Sevilla. El objetivo principal es fomentar la puesta en común al inicio de las sesiones...
Uploaded on: March 25, 2023 -
July 4, 2024 (v1)Publication
En este capítulo se presenta el planteamiento, desarrollo y resultados de un ciclo de mejora en el aula (CIMA) aplicado en la asignatura de electrónica y automatización del producto, del tercer año del grado en ingeniería de diseño industrial y desarrollo del producto. La asignatura es impartida en la Escuela Politécnica Superior de la...
Uploaded on: July 5, 2024 -
May 16, 2018 (v1)Publication
Information leakaged by cryptosistems can be used by third parties to reveal critical information using Side Channel Attacks (SCAs). Differential Power Analysis (DPA) is a SCA that uses the power consumption dependence on the processed data. Designers widely use differential logic styles with constant power consumption to protect devices...
Uploaded on: March 27, 2023 -
March 9, 2023 (v1)Publication
We provide an overview of selected crypto-hardware devices, with a special reference to the lightweight electronic implementation of encryption/decryption schemes, hash functions, and true random number generators. In detail, we discuss the hardware implementation of the chief algorithms used in private-key cryptography, public-key...
Uploaded on: March 25, 2023 -
January 10, 2024 (v1)Publication
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. Consequently, security threats are constantly rising and increasingly powerful. With the addition of the upcoming scenario of quantum computing, these threats have become a front-line concern in the crypto-community. Although...
Uploaded on: January 12, 2024 -
January 18, 2024 (v1)Publication
As quantum computing technology advances, the security of traditional cryptographic systems is becoming increasingly vulnerable. To address this issue, Post-Quantum Cryptography (PQC) has emerged as a promising solution that can withstand the brute force of quantum computers. However, PQC is not immune to attacks that exploit weaknesses in...
Uploaded on: January 20, 2024 -
November 3, 2021 (v1)Publication
The design of secure circuits in emerging technologies is an appealing area that requires new efforts and attention as an effective solution to secure applications with power constraints. The paper deals with the optimized design of DPA-resilient hiding-based techniques, using Tunnel Field-Effect Transistors (TFETs). Specifically, proposed TFET...
Uploaded on: December 4, 2022 -
March 7, 2023 (v1)Publication
Portable devices such as smartphones, smart cards and other embedded devices require encryption technology to guarantee security. Users store private data in electronic devices on a daily basis. Cryptography exploits reliable authentication mechanisms in order to ensure data confidentiality. Typical encryption security is based on algorithms...
Uploaded on: March 25, 2023 -
July 7, 2022 (v1)Publication
The design of near future cryptocircuits will require greater performance characteristics in order to be implemented in devices with very limited resources for secure applications. Considering the security against differential power side-channel attacks (DPA), explorations of different implementations of dual-precharge logic gates with advanced...
Uploaded on: March 25, 2023 -
December 1, 2022 (v1)Publication
Side-channel attacks are a real threat, exploiting and revealing the secret data stored in our electronic devices just analyzing the leaked information of the cryptographic modules during their normal encryption/decryption operations. In this sense, electromagnetic attacks have been posed as one of the most powerful attacks, retrieving the...
Uploaded on: December 4, 2022 -
January 16, 2023 (v1)Publication
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced Encryption Standard (AES). In order to minimize these types of vulnerabilities, several mechanisms...
Uploaded on: March 24, 2023 -
March 29, 2017 (v1)Publication
Physical Unclonable functions (PUFs) have appeared as a promising solution to provide security in hardware. SRAM PUFs offer the advantage, over other PUF constructions, of reusing resources (memories) that already exist in many designs. However, their intrinsic noisy nature produces the so called bit flipping effect, which is a problem in...
Uploaded on: December 4, 2022 -
December 7, 2021 (v1)Publication
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a malfunction to reveal secret information, pose a serious threat for security. These attacks are...
Uploaded on: March 8, 2024 -
March 23, 2017 (v1)Publication
This paper exposes a hardware-in-the-loop metho- dology to verify the performance of a programmable and confi- gurable application specific integrated circuit (ASIC) that imple- ments piecewise affine (PWA) controllers. The ASIC inserted into a printed circuit board (PCB) is connected to a logic analyzer that generates the input patterns to the...
Uploaded on: December 4, 2022 -
March 15, 2021 (v1)Publication
Fault injection, in particular Differential Fault Analysis (DFA), has become one of the main methods for exploiting vulnerabilities into the block ciphers currently used in a multitude of applications. In order to minimize this type of vulnerabilities, several mechanisms have been proposed to detect this type of attacks. However, these...
Uploaded on: March 25, 2023 -
December 12, 2023 (v1)PublicationExperimental cartography generation methodology for Electromagnetic Fault Injection Attacks [póster]
The Electromagnetic Fault Injection (EMFI) is one of the methods to inject faults in the circuits with different purposes, from the security analysis point of view to the study of resilience against environmental conditions of the circuits. Focusing on secure cryptographic applications, in order to study the vulnerability of a circuit and...
Uploaded on: December 14, 2023 -
July 8, 2024 (v1)Publication
In this paper, we present a review of the work [1]. The fast settlement of Privacy and Secure operations in the Internet of Things (IoT) is appealing the selection of mechanisms to achieve a higher level of security at the minimum cost and with reasonable performances. In recent years, dozens of proposals have been presented to design circuits...
Uploaded on: July 9, 2024