Una de las principales limitaciones para la implantación práctica de dispositivos IoT (Internet Of Things) se encuentra en la banda del espectro electromagnético empleado para comunicaciones, el cual ha de ser compartido entre un número creciente de dispositivos que procesan una gran cantidad de información. La tecnología denominada Radio...
-
December 3, 2021 (v1)PublicationUploaded on: March 25, 2023
-
January 10, 2024 (v1)Publication
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. Consequently, security threats are constantly rising and increasingly powerful. With the addition of the upcoming scenario of quantum computing, these threats have become a front-line concern in the crypto-community. Although...
Uploaded on: January 12, 2024 -
April 3, 2025 (v1)Publication
Considerable attention has been given to addressing side-channel attacks to improve the security of cryptographic hardware implementations. These attacks encourage the exploration of various countermeasures across different levels of abstraction, through masking and hiding techniques, mainly. In this paper, we introduce a novel hiding...
Uploaded on: April 5, 2025 -
December 18, 2023 (v1)Publication
Abstract— This paper investigates the use of the body terminal of MOS transistors to improve the linearity of some key circuits used to implement analog and mixed-signal circuits integrated in Fully Depleted Silicon on Insulator (FD-SOI) CMOS. This technology allows to increase the body factor with respect to conventional (bulk) CMOS processes....
Uploaded on: December 20, 2023 -
December 1, 2022 (v1)Publication
Side-channel attacks are a real threat, exploiting and revealing the secret data stored in our electronic devices just analyzing the leaked information of the cryptographic modules during their normal encryption/decryption operations. In this sense, electromagnetic attacks have been posed as one of the most powerful attacks, retrieving the...
Uploaded on: December 4, 2022 -
July 8, 2024 (v1)Publication
In this paper, we present a review of the work [1]. The fast settlement of Privacy and Secure operations in the Internet of Things (IoT) is appealing the selection of mechanisms to achieve a higher level of security at the minimum cost and with reasonable performances. In recent years, dozens of proposals have been presented to design circuits...
Uploaded on: July 9, 2024