En la última década hemos asistido a la penetración de los sistemas digitales en la vida cotidiana. Por citar sólo un ejemplo, señalemos que los computadores digitales se han convertido en herramienta básica del trabajo científico, administrativo, industrial, militar y educacional. Incluso áreas que tradicionalmente no han estado incluidas...
-
November 27, 2014 (v1)PublicationUploaded on: March 27, 2023
-
February 4, 2022 (v1)Publication
No description
Uploaded on: March 27, 2023 -
February 3, 2022 (v1)Publication
No description
Uploaded on: March 25, 2023 -
March 15, 2021 (v1)Publication
Modular multiplication is the key operation in systems based on public key encryption, both for RSA and elliptic curve (ECC) systems. High performance hardware implementations of RSA and ECC systems use the Montgomery algorithm for modular multiplication, since it allows results to be obtained without performing the division operation. The aim...
Uploaded on: March 25, 2023 -
September 19, 2018 (v1)Publication
Se describe una familia de redes de interconexión para sistemas multiprocesadores. Estas redes utilizan buses múltiples estructurados en varios niveles e incorporan el concepto de tolerancia a fallos mediante redundancia en las vías de comunicación. Sus principales características son: buena relación coste/ rendimiento, fiabilidad, modularidad...
Uploaded on: March 27, 2023 -
October 3, 2017 (v1)Publication
A practical N-user arbiter and its implementation are presented in this correspondence. Because of the asynchronous character of its input variables (request signals), the design proposed is asynchronous and keeps in mind the possibility of metastable operations. The structure of the arbiter is very simple and modular.
Uploaded on: March 27, 2023 -
February 2, 2022 (v1)Publication
En esta comunicación se presenta la realización de una actividad teórico-práctica, encuadrada dentro del marco ECTS, para un primer curso de Electrónica Digital. Está ideada para desarrollarse en un entorno de bajo coste y de forma que el alumno tenga a su disposición ayudas a diferentes niveles (información jerarquizada). Partiendo de un...
Uploaded on: December 4, 2022 -
September 19, 2018 (v1)Publication
La realización de sistemas digitales mediante técnicas autotemporizadas constituye la mejor alternativa para resolver la problemática de las técnicas síncronas en circuitos VLSI. En esta comunicación se presenta una mejora a la arquitectura autotemporizada presentada en [1,2] y se aplica a la realización de multiplicadores matriciales...
Uploaded on: December 5, 2022 -
September 14, 2018 (v1)Publication
El diseño de biestables con riesgo de metaestabilidad requiere que posean coeficientes de resolución adecuados. En este trabajo, se introducen dos métodos para su medida y se comparan con otro previamente reportado. Uno de nuestros métodos mejora en dos órdenes de magnitud los tiempos de medida.
Uploaded on: December 4, 2022 -
February 3, 2022 (v1)Publication
No description
Uploaded on: March 25, 2023 -
March 10, 2021 (v1)Publication
The security of cryptocircuits is today threatened not only by attacks on algorithms but also, and above all, by attacks on the circuit implementations themselves. These are known as side channel attacks. One variety is the Active Fault Analysis attack, that can make a circuit vulnerable by changing its behavior in a certain way. This article...
Uploaded on: March 25, 2023 -
October 3, 2017 (v1)Publication
This article presents the development of an experimental system to introduce faults in Trivium stream ciphers implemented on FPGA. The developed system has made possible to analyze the vulnerability of these implementations against fault attacks. The developed system consists of a mechanism that injects small pulses in the clock signal, and...
Uploaded on: December 4, 2022 -
March 10, 2021 (v1)Publication
Ministerio de Economía y Competitividad TEC2013-45523-R
Uploaded on: December 4, 2022 -
February 7, 2022 (v1)Publication
No description
Uploaded on: December 4, 2022 -
March 10, 2021 (v1)Publication
Today, the large amount of information exchanged among various devices as well as the growth of the Internet of Things (IoT) demand the development of devices that ensure secure communications, preventing malicious agents from tapping sensitive data. Indeed, information security is one of the key challenges to address within the IoT field....
Uploaded on: February 7, 2024 -
March 15, 2021 (v1)Publication
We are presenting the experimental measurements of the power consumption and the maximum frequency in an ASIC prototype of 12 versions of the Trivium cipher: one standard version and two low power versions (FPLP and MPLP) with four different radix (radix-1, radix-2, radix-8 and radix-16). It is also described the mechanism for measuring power...
Uploaded on: March 8, 2024