Search Results - "Sarmiento, Marco"
-
1
A Unified NVRAM and TRNG in Standard CMOS Technology
Published in IEEE access (2022)“…True Random Number Generator (TRNG) provides the different keys for device authentication and cryptography. Typically, the TRNG is implemented in a standalone…”
Get full text
Journal Article -
2
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
Published in Cryptography (01-06-2022)“…Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced…”
Get full text
Journal Article -
3
A Robust and Healthy Against PVT Variations TRNG Based on Frequency Collapse
Published in IEEE access (2022)“…True Random Number Generator (TRNG) is used in many applications, generally for generating random cryptography keys. In this way, the trust of the cryptography…”
Get full text
Journal Article -
4
A Fully Digital True Random Number Generator With Entropy Source Based in Frequency Collapse
Published in IEEE access (2021)“…All cryptography systems have a True Random Number Generator (TRNG). In the process of validating, these systems are necessary for prototyping in Field…”
Get full text
Journal Article -
5
Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling
Published in IEEE access (2022)“…A Trusted Execution Environment (TEE) sets a platform to secure applications based on the Chain-of-Trust (CoT). The starting point of the CoT is called the…”
Get full text
Journal Article -
6
A Unified PUF and Crypto Core Exploiting the Metastability in Latches
Published in Future internet (01-10-2022)“…Hardware acceleration of cryptography algorithms represents an emerging approach to obtain benefits in terms of speed and side-channel resistance compared to…”
Get full text
Journal Article -
7
Aplicación de la regeneración ósea guiada con injerto en bloque de mentón en la colocación de implantes
Published in Odontología sanmarquina (12-02-2016)“…Los defectos óseos alveolares que se originan por la pérdida de una pieza dentaria pueden dificultar diferentes procedimientos odontológicos, como la…”
Get full text
Journal Article -
8
Systems on a Chip With 8 and 32 Bits Processors in 0.18-μm Technology for IoT Applications
Published in IEEE transactions on circuits and systems. II, Express briefs (01-05-2022)“…The Internet-of-Things applications use embedded processors to execute lightweight tasks for sensing and management of communications. These applications use…”
Get full text
Journal Article -
9
A Unified OTP and PUF Exploiting Post-Program Current on Standard CMOS Technology
Published in 2024 IEEE International Symposium on Circuits and Systems (ISCAS) (19-05-2024)“…Root-of-Trust (RoT) uses the hardware primitives to provide security in the integrated electronic systems, preventing attacks against the vital information of…”
Get full text
Conference Proceeding -
10
A Sub-μ W Reversed-Body-Bias 8-bit Processor on 65-nm Silicon-on-Thin-Box (SOTB) for IoT Applications
Published in IEEE transactions on circuits and systems. II, Express briefs (01-09-2021)“…For most Internet-of-Things (IoT) applications, embedded processors typically execute lightweight tasks such as sensing and communication. The typical IoT…”
Get full text
Journal Article -
11
In-NVRAM Unified PUF and TRNG Based on Standard CMOS Technology
Published in 2023 IEEE International Symposium on Circuits and Systems (ISCAS) (21-05-2023)“…Hardware security primitives provide Root-of-Trust (RoT) procedures for booting, authentication, and key generation processes in secure integrated systems. The…”
Get full text
Conference Proceeding -
12
A Flexible Debugger for a RISC-V Based 32-bit System-on-Chip
Published in 2020 IEEE 11th Latin American Symposium on Circuits & Systems (LASCAS) (01-02-2020)“…Complex system-on-chip (SoC) demands to integrate debugging systems to control and monitor the internal behavior for post-silicon testing. Debugging systems…”
Get full text
Conference Proceeding -
13
A 3.65 Gb/s Area-Efficiency ChaCha20 Cryptocore
Published in 2022 19th International SoC Design Conference (ISOCC) (19-10-2022)“…In the last decade, the efforts to provide a secure channel for end-to-end communications have focused on developing high-throughput, side-channel resistant,…”
Get full text
Conference Proceeding -
14
A Low-Power Low-Area SoC based in RISC-V Processor for IoT Applications
Published in 2021 18th International SoC Design Conference (ISOCC) (06-10-2021)“…The IoT applications use embedded processors to execute lightweight tasks for sensing and management of communications, using different energy harvesting…”
Get full text
Conference Proceeding -
15
ChaCha20-Poly1305 Crypto Core Compatible with Transport Layer Security 1.3
Published in 2021 18th International SoC Design Conference (ISOCC) (06-10-2021)“…The security of the information represents a vital part of all communications protocols. In computer networks, Transport Layer Security (TLS) represents the…”
Get full text
Conference Proceeding -
16
System-on-Chip Implementation of Trusted Execution Environment with Heterogeneous Architecture
Published in 2021 IEEE Hot Chips 33 Symposium (HCS) (22-08-2021)“…This poster presents a Trusted Execution Environment (TEE) hardware implementation based on a heterogeneous architecture. The TEE verifies the integrity of…”
Get full text
Conference Proceeding -
17
Lactante masculino con inmunodeficiencia combinada grave
Published in Acta pediátrica de México (07-08-2023)“…Paciente masculino que falleció a la edad de ocho meses, hijo de padres aparentemente sanos, con antecedente de muertes, en la primera infancia, de niños…”
Get full text
Journal Article