Search Results - "Sarmiento, Marco"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    A Unified NVRAM and TRNG in Standard CMOS Technology by Serrano, Ronaldo, Duran, Ckristian, Sarmiento, Marco, Pham, Cong-Kha

    Published in IEEE access (2022)
    “…True Random Number Generator (TRNG) provides the different keys for device authentication and cryptography. Typically, the TRNG is implemented in a standalone…”
    Get full text
    Journal Article
  2. 2

    ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3 by Serrano, Ronaldo, Duran, Ckristian, Sarmiento, Marco, Pham, Cong-Kha, Hoang, Trong-Thuc

    Published in Cryptography (01-06-2022)
    “…Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced…”
    Get full text
    Journal Article
  3. 3

    A Robust and Healthy Against PVT Variations TRNG Based on Frequency Collapse by Serrano, Ronaldo, Duran, Ckristian, Sarmiento, Marco, Hoang, Trong-Thuc, Tsukamoto, Akira, Suzaki, Kuniyasu, Pham, Cong-Kha

    Published in IEEE access (2022)
    “…True Random Number Generator (TRNG) is used in many applications, generally for generating random cryptography keys. In this way, the trust of the cryptography…”
    Get full text
    Journal Article
  4. 4

    A Fully Digital True Random Number Generator With Entropy Source Based in Frequency Collapse by Serrano, Ronaldo, Duran, Ckristian, Hoang, Trong-Thuc, Sarmiento, Marco, Nguyen, Khai-Duy, Tsukamoto, Akira, Suzaki, Kuniyasu, Pham, Cong-Kha

    Published in IEEE access (2021)
    “…All cryptography systems have a True Random Number Generator (TRNG). In the process of validating, these systems are necessary for prototyping in Field…”
    Get full text
    Journal Article
  5. 5

    Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling by Hoang, Trong-Thuc, Duran, Ckristian, Serrano, Ronaldo, Sarmiento, Marco, Nguyen, Khai-Duy, Tsukamoto, Akira, Suzaki, Kuniyasu, Pham, Cong-Kha

    Published in IEEE access (2022)
    “…A Trusted Execution Environment (TEE) sets a platform to secure applications based on the Chain-of-Trust (CoT). The starting point of the CoT is called the…”
    Get full text
    Journal Article
  6. 6

    A Unified PUF and Crypto Core Exploiting the Metastability in Latches by Serrano, Ronaldo, Duran, Ckristian, Sarmiento, Marco, Dang, Tuan-Kiet, Hoang, Trong-Thuc, Pham, Cong-Kha

    Published in Future internet (01-10-2022)
    “…Hardware acceleration of cryptography algorithms represents an emerging approach to obtain benefits in terms of speed and side-channel resistance compared to…”
    Get full text
    Journal Article
  7. 7

    Aplicación de la regeneración ósea guiada con injerto en bloque de mentón en la colocación de implantes by Marco Rivas Sarmiento, Donald Ramos-Perfecto

    Published in Odontología sanmarquina (12-02-2016)
    “…Los defectos óseos alveolares que se originan por la pérdida de una pieza dentaria pueden dificultar diferentes procedimientos odontológicos, como la…”
    Get full text
    Journal Article
  8. 8

    Systems on a Chip With 8 and 32 Bits Processors in 0.18-μm Technology for IoT Applications by Sarmiento, Marco, Nguyen, Khai-Duy, Duran, Ckristian, Serrano, Ronaldo, Hoang, Trong-Thuc, Ishibashi, Koichiro, Pham, Cong-Kha

    “…The Internet-of-Things applications use embedded processors to execute lightweight tasks for sensing and management of communications. These applications use…”
    Get full text
    Journal Article
  9. 9

    A Unified OTP and PUF Exploiting Post-Program Current on Standard CMOS Technology by Serrano, Ronaldo, Duran, Ckristian, Sarmiento, Marco, Nguyen, Khai-Duy, Iizuka, Tetsuya, Hoang, Trong-Thuc, Pham, Cong-Kha

    “…Root-of-Trust (RoT) uses the hardware primitives to provide security in the integrated electronic systems, preventing attacks against the vital information of…”
    Get full text
    Conference Proceeding
  10. 10

    A Sub-μ W Reversed-Body-Bias 8-bit Processor on 65-nm Silicon-on-Thin-Box (SOTB) for IoT Applications by Sarmiento, Marco, Nguyen, Khai-Duy, Duran, Ckristian, Hoang, Trong-Thuc, Serrano, Ronaldo, Hoang, Van-Phuc, Tran, Xuan-Tu, Ishibashi, Koichiro, Pham, Cong-Kha

    “…For most Internet-of-Things (IoT) applications, embedded processors typically execute lightweight tasks such as sensing and communication. The typical IoT…”
    Get full text
    Journal Article
  11. 11

    In-NVRAM Unified PUF and TRNG Based on Standard CMOS Technology by Serrano, Ronaldo, Sarmiento, Marco, Duran, Ckristian, Dang, Tuan-Kiet, Hoang, Trong-Thuc, Pham, Cong-Kha

    “…Hardware security primitives provide Root-of-Trust (RoT) procedures for booting, authentication, and key generation processes in secure integrated systems. The…”
    Get full text
    Conference Proceeding
  12. 12

    A Flexible Debugger for a RISC-V Based 32-bit System-on-Chip by Ramirez, Wilmer, Sarmiento, Marco, Roa, Elkim

    “…Complex system-on-chip (SoC) demands to integrate debugging systems to control and monitor the internal behavior for post-silicon testing. Debugging systems…”
    Get full text
    Conference Proceeding
  13. 13

    A 3.65 Gb/s Area-Efficiency ChaCha20 Cryptocore by Serrano, Ronaldo, Sarmiento, Marco, Duran, Ckristian, Hoang, Trong-Thuc, Pham, Cong-Kha

    “…In the last decade, the efforts to provide a secure channel for end-to-end communications have focused on developing high-throughput, side-channel resistant,…”
    Get full text
    Conference Proceeding
  14. 14

    A Low-Power Low-Area SoC based in RISC-V Processor for IoT Applications by Serrano, Ronaldo, Sarmiento, Marco, Duran, Ckristian, Nguyen, Khai-Duy, Hoang, Trong-Thuc, Ishibashi, Koichiro, Pham, Cong-Kha

    “…The IoT applications use embedded processors to execute lightweight tasks for sensing and management of communications, using different energy harvesting…”
    Get full text
    Conference Proceeding
  15. 15

    ChaCha20-Poly1305 Crypto Core Compatible with Transport Layer Security 1.3 by Serrano, Ronaldo, Duran, Ckristian, Hoang, Trong-Thuc, Sarmiento, Marco, Tsukamoto, Akira, Suzaki, Kuniyasu, Pham, Cong-Kha

    “…The security of the information represents a vital part of all communications protocols. In computer networks, Transport Layer Security (TLS) represents the…”
    Get full text
    Conference Proceeding
  16. 16

    System-on-Chip Implementation of Trusted Execution Environment with Heterogeneous Architecture by Hoang, Trong-Thuc, Duran, Ckristian, Serrano, Ronaldo, Sarmiento, Marco, Nguyen, Khai-Duy, Tsukamoto, Akira, Suzaki, Kuniyasu, Pham, Cong-Kha

    Published in 2021 IEEE Hot Chips 33 Symposium (HCS) (22-08-2021)
    “…This poster presents a Trusted Execution Environment (TEE) hardware implementation based on a heterogeneous architecture. The TEE verifies the integrity of…”
    Get full text
    Conference Proceeding
  17. 17

    Lactante masculino con inmunodeficiencia combinada grave by RAMIREZ - RISTORI, ALFONSO GILBERTO, Nakashimada, Marco Antonio Yamazaki, Abril, Marco Antonio Sarmiento

    Published in Acta pediátrica de México (07-08-2023)
    “…Paciente masculino que falleció a la edad de ocho meses, hijo de padres aparentemente sanos, con antecedente de muertes, en la primera infancia, de niños…”
    Get full text
    Journal Article