El ciclo de mejora en el aula presentado en este capítulo se ha desarrollado en la asignatura de Acondicionamiento y Conversión de Señales del Grado de Ingeniería Electrónica Industrial impartido en la Escuela Politécnica Superior de la Universidad de Sevilla. El objetivo principal es fomentar la puesta en común al inicio de las sesiones...
-
June 8, 2022 (v1)PublicationPuesta en común y fomento de la exposición de aplicaciones reales en los laboratorios de electrónicaUploaded on: March 25, 2023
-
July 4, 2024 (v1)Publication
En este capítulo se presenta el planteamiento, desarrollo y resultados de un ciclo de mejora en el aula (CIMA) aplicado en la asignatura de electrónica y automatización del producto, del tercer año del grado en ingeniería de diseño industrial y desarrollo del producto. La asignatura es impartida en la Escuela Politécnica Superior de la...
Uploaded on: July 5, 2024 -
March 18, 2019 (v1)Publication
A diario personas de todo el mundo hacen uso de dispositivos electrónicos en los que almacenan o con los que intercambian información privada. La confidencialidad y privacidad es un derecho frente a posibles intrusos, por lo que la seguridad en las nuevas tecnologías es un factor de transcendental importancia que exige la atención de la...
Uploaded on: December 4, 2022 -
May 16, 2018 (v1)Publication
Information leakaged by cryptosistems can be used by third parties to reveal critical information using Side Channel Attacks (SCAs). Differential Power Analysis (DPA) is a SCA that uses the power consumption dependence on the processed data. Designers widely use differential logic styles with constant power consumption to protect devices...
Uploaded on: March 27, 2023 -
March 9, 2023 (v1)Publication
We provide an overview of selected crypto-hardware devices, with a special reference to the lightweight electronic implementation of encryption/decryption schemes, hash functions, and true random number generators. In detail, we discuss the hardware implementation of the chief algorithms used in private-key cryptography, public-key...
Uploaded on: March 25, 2023 -
May 10, 2024 (v1)Publication
The majority of data exchanged between connected devices are confidential and must be protected against unauthorized access. To ensure data protection, so-called cryptographic algorithms are used. These algorithms have proven to be mathematically secure against brute force due to the key length, but their physical implementations are vulnerable...
Uploaded on: April 5, 2025 -
January 10, 2024 (v1)Publication
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. Consequently, security threats are constantly rising and increasingly powerful. With the addition of the upcoming scenario of quantum computing, these threats have become a front-line concern in the crypto-community. Although...
Uploaded on: January 12, 2024 -
January 18, 2024 (v1)Publication
As quantum computing technology advances, the security of traditional cryptographic systems is becoming increasingly vulnerable. To address this issue, Post-Quantum Cryptography (PQC) has emerged as a promising solution that can withstand the brute force of quantum computers. However, PQC is not immune to attacks that exploit weaknesses in...
Uploaded on: January 20, 2024