En la última década hemos asistido a la penetración de los sistemas digitales en la vida cotidiana. Por citar sólo un ejemplo, señalemos que los computadores digitales se han convertido en herramienta básica del trabajo científico, administrativo, industrial, militar y educacional. Incluso áreas que tradicionalmente no han estado incluidas...
-
November 27, 2014 (v1)PublicationUploaded on: March 27, 2023
-
February 4, 2022 (v1)Publication
No description
Uploaded on: March 27, 2023 -
February 3, 2022 (v1)Publication
No description
Uploaded on: March 25, 2023 -
March 15, 2021 (v1)Publication
Modular multiplication is the key operation in systems based on public key encryption, both for RSA and elliptic curve (ECC) systems. High performance hardware implementations of RSA and ECC systems use the Montgomery algorithm for modular multiplication, since it allows results to be obtained without performing the division operation. The aim...
Uploaded on: March 25, 2023 -
March 10, 2021 (v1)Publication
Ministerio de Economía y Competitividad TEC2013-45523-R
Uploaded on: December 4, 2022 -
October 4, 2017 (v1)Publication
This paper describes a low power hardware implementation of the Trivium stream cipher based on shift register parallelization techniques. The de-sign was simulated with Modelsim, and synthesized with Synopsys in three CMOS technologies with different gate lengths: 180nm, 130nm and 90 nm. The aim of this paper is to evaluate the suitability of...
Uploaded on: December 4, 2022 -
October 3, 2017 (v1)Publication
This article presents the development of an experimental system to introduce faults in Trivium stream ciphers implemented on FPGA. The developed system has made possible to analyze the vulnerability of these implementations against fault attacks. The developed system consists of a mechanism that injects small pulses in the clock signal, and...
Uploaded on: December 4, 2022 -
February 2, 2022 (v1)Publication
En esta comunicación se presenta la realización de una actividad teórico-práctica, encuadrada dentro del marco ECTS, para un primer curso de Electrónica Digital. Está ideada para desarrollarse en un entorno de bajo coste y de forma que el alumno tenga a su disposición ayudas a diferentes niveles (información jerarquizada). Partiendo de un...
Uploaded on: December 4, 2022 -
March 15, 2021 (v1)Publication
This paper describes the use of parallelization techniques to reduce dynamic power consumption in hardware implementations of the Trivium stream cipher. Trivium is a synchronous stream cipher based on a combination of three non-linear feedback shift registers. In 2008, it was chosen as a finalist for the hardware profile of the eSTREAM project....
Uploaded on: April 4, 2025 -
September 19, 2018 (v1)Publication
Se describe una familia de redes de interconexión para sistemas multiprocesadores. Estas redes utilizan buses múltiples estructurados en varios niveles e incorporan el concepto de tolerancia a fallos mediante redundancia en las vías de comunicación. Sus principales características son: buena relación coste/ rendimiento, fiabilidad, modularidad...
Uploaded on: March 27, 2023 -
October 3, 2017 (v1)Publication
A practical N-user arbiter and its implementation are presented in this correspondence. Because of the asynchronous character of its input variables (request signals), the design proposed is asynchronous and keeps in mind the possibility of metastable operations. The structure of the arbiter is very simple and modular.
Uploaded on: March 27, 2023 -
October 4, 2017 (v1)Publication
The objective of this paper is to explore the applicability of clock gating techniques to binary counters in order to reduce the power consumption as well as the switching noise generation. A measurement methodology to establish right comparisons between different implementations of gateclocked counters is presented. Basically two ways of...
Uploaded on: March 27, 2023 -
March 10, 2021 (v1)Publication
The security of cryptocircuits is today threatened not only by attacks on algorithms but also, and above all, by attacks on the circuit implementations themselves. These are known as side channel attacks. One variety is the Active Fault Analysis attack, that can make a circuit vulnerable by changing its behavior in a certain way. This article...
Uploaded on: March 25, 2023 -
February 7, 2022 (v1)Publication
No description
Uploaded on: December 4, 2022