Una de las principales limitaciones para la implantación práctica de dispositivos IoT (Internet Of Things) se encuentra en la banda del espectro electromagnético empleado para comunicaciones, el cual ha de ser compartido entre un número creciente de dispositivos que procesan una gran cantidad de información. La tecnología denominada Radio...
-
December 3, 2021 (v1)PublicationUploaded on: March 25, 2023
-
January 10, 2024 (v1)Publication
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. Consequently, security threats are constantly rising and increasingly powerful. With the addition of the upcoming scenario of quantum computing, these threats have become a front-line concern in the crypto-community. Although...
Uploaded on: January 12, 2024 -
December 1, 2022 (v1)Publication
Side-channel attacks are a real threat, exploiting and revealing the secret data stored in our electronic devices just analyzing the leaked information of the cryptographic modules during their normal encryption/decryption operations. In this sense, electromagnetic attacks have been posed as one of the most powerful attacks, retrieving the...
Uploaded on: December 4, 2022 -
December 18, 2023 (v1)Publication
Abstract— This paper investigates the use of the body terminal of MOS transistors to improve the linearity of some key circuits used to implement analog and mixed-signal circuits integrated in Fully Depleted Silicon on Insulator (FD-SOI) CMOS. This technology allows to increase the body factor with respect to conventional (bulk) CMOS processes....
Uploaded on: December 20, 2023 -
July 8, 2024 (v1)Publication
In this paper, we present a review of the work [1]. The fast settlement of Privacy and Secure operations in the Internet of Things (IoT) is appealing the selection of mechanisms to achieve a higher level of security at the minimum cost and with reasonable performances. In recent years, dozens of proposals have been presented to design circuits...
Uploaded on: July 9, 2024 -
July 4, 2024 (v1)Publication
In this paper, we present a review of the work [1]. In this work a complete setup to break ASIC implementations of standard Trivium stream cipher was presented. The setup allows to recover the secret keys combining the use of the active noninvasive technique attack of clock manipulation and Differential Fault Analysis (DFA) cryptanalysis. The...
Uploaded on: July 5, 2024