Search Results - "Verbauwhede, I."

Refine Results
  1. 1

    Unveiling the Vulnerability of Oxide-Breakdown-Based PUF by Saraza-Canflanca, P., Fodor, F., Diaz-Fortuny, J., Gierlichs, B., Degraeve, R., Kaczer, B., Verbauwhede, I., Bury, E.

    Published in IEEE electron device letters (01-05-2024)
    “…This work reports a potential vulnerability of an oxide-breakdown-based Physical Unclonable Function (PUF). This generates a unique chip key based on the…”
    Get full text
    Journal Article
  2. 2

    Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors by Hodjat, A., Verbauwhede, I.

    Published in IEEE transactions on computers (01-04-2006)
    “…This paper explores the area-throughput trade-off for an ASIC implementation of the advanced encryption standard (AES). Different pipelined implementations of…”
    Get full text
    Journal Article
  3. 3

    Elliptic-Curve-Based Security Processor for RFID by Yong Ki Lee, Sakiyama, K., Batina, L., Verbauwhede, I.

    Published in IEEE transactions on computers (01-11-2008)
    “…RFID (radio frequency identification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide…”
    Get full text
    Journal Article
  4. 4

    A digital design flow for secure integrated circuits by Tiri, K., Verbauwhede, I.

    “…Small embedded integrated circuits (ICs) such as smart cards are vulnerable to the so-called side-channel attacks (SCAs). The attacker can gain information by…”
    Get full text
    Journal Article
  5. 5

    Exploiting Bias Temperature Instability for Reservoir Computing in Edge Artificial Intelligence Applications by Guo, Y., Degraeve, R., Vandemaele, M., Saraza-Canflanca, P., Franco, J., Kaczer, B., Bury, E., Verbauwhede, I.

    “…In this paper, we utilize Negative Bias Temperature Instability (NBTI) effect in pFETs as a computing mechanism. Specifically, NBTI is capable of implementing…”
    Get full text
    Conference Proceeding
  6. 6

    Design and performance testing of a 2.29-GB/s Rijndael processor by Verbauwhede, I., Schaumont, P., Kuo, H.

    Published in IEEE journal of solid-state circuits (01-03-2003)
    “…This contribution describes the design and performance testing of an Advanced Encryption Standard (AES) compliant encryption chip that delivers 2.29 GB/s of…”
    Get full text
    Journal Article
  7. 7

    X-Ray and Proton Radiation Effects on 40 nm CMOS Physically Unclonable Function Devices by Wang, P. F., Zhang, E. X., Chuang, K. H., Liao, W., Gong, H., Wang, P., Arutt, C. N., Ni, K., Mccurdy, M. W., Verbauwhede, I., Bury, E., Linten, D., Fleetwood, D. M., Schrimpf, R. D., Reed, R. A.

    Published in IEEE transactions on nuclear science (01-08-2018)
    “…Total ionizing dose effects are investigated on a physically unclonable function (PUF) based on CMOS breakdown. Devices irradiated to 2 Mrad(SiO 2 ) show less…”
    Get full text
    Journal Article
  8. 8

    Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n) by Sakiyama, K., Batina, L., Preneel, B., Verbauwhede, I.

    Published in IEEE transactions on computers (01-09-2007)
    “…This paper presents a reconfigurable curve-based cryptoprocessor that accelerates scalar multiplication of Elliptic Curve Cryptography (ECC) and HyperElliptic…”
    Get full text
    Journal Article
  9. 9

    Dependence of RFID Reader Antenna Design on Read Out Distance by Aerts, W., De Mulder, E., Preneel, B., Vandenbosch, G., Verbauwhede, I.

    “…The design of a reader antenna is described for usage in radio frequency identification (RFID) systems at 13.56 MHz, as defined in the ISO-14443a standard. It…”
    Get full text
    Journal Article
  10. 10

    Design of an Interconnect Architecture and Signaling Technology for Parallelism in Communication by Jongsun Kim, Verbauwhede, I., Chang, M.-C.F.

    “…The need for efficient interconnect architectures beyond the conventional time-division multiplexing (TDM) protocol-based interconnects has been brought on by…”
    Get full text
    Journal Article
  11. 11

    Advanced RF/baseband interconnect schemes for inter- and intra-ULSI communications by Chang, M.-C.F., Verbauwhede, I., Chien, C., Zhiwei Xu, Jongsun Kim, Ko, J., Qun Gu, Bo-Cheng Lai

    Published in IEEE transactions on electron devices (01-07-2005)
    “…Future inter- and intra-ULSI interconnect systems demand extremely high data rates (up to 100 Gbps/pin or 20-Tbps aggregate) as well as bidirectional multiI/O…”
    Get full text
    Journal Article
  12. 12

    Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems by De Mulder, E., Örs, S.B., Preneel, B., Verbauwhede, I.

    Published in Computers & electrical engineering (01-09-2007)
    “…This paper describes the first differential power and electromagnetic analysis attacks performed on a hardware implementation of an elliptic curve…”
    Get full text
    Journal Article
  13. 13

    Domain-specific codesign for embedded security by Schaumont, P., Verbauwhede, I.

    Published in Computer (Long Beach, Calif.) (01-04-2003)
    “…Systems with multiple design domains require codesign of application domains. Dedicated hardware processors implement the application domains and software…”
    Get full text
    Journal Article
  14. 14

    A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs by Tiri, Kris, Verbauwhede, Ingrid

    Published in Design, Automation and Test in Europe (01-01-2005)
    “…This paper presents a digital VLSI design flow to create secure, side-channel attack (SCA) resistant integrated circuits. The design flow starts from a normal…”
    Get full text
    Conference Proceeding
  15. 15

    Low-cost implementations of on-the-fly tests for random number generators by Veljkovic, F., Rozic, V., Verbauwhede, I.

    “…Random number generators (RNG) are important components in various cryptographic systems. Embedded security systems often require a high-quality digital source…”
    Get full text
    Conference Proceeding
  16. 16

    High-throughput programmable cryptocoprocessor by Hodjat, A., Verbauwhede, I.

    Published in IEEE MICRO (01-05-2004)
    “…High-speed Internet protocol security (IPsec) applications require high throughput and flexible security engines. A loosely coupled cryptocoprocessor based on…”
    Get full text
    Journal Article
  17. 17

    Reconfigurable modular arithmetic logic unit supporting high-performance RSA and ECC over GF( p ) by Sakiyama, K., Mentens, N., Batina, L., Preneel, B., Verbauwhede, I.

    Published in International journal of electronics (01-05-2007)
    “…This paper presents a reconfigurable hardware architecture for public-key cryptosystems. By changing the connections of coarse grain carry-save adders (CSAs),…”
    Get full text
    Journal Article Conference Proceeding
  18. 18

    Multilevel Design Validation in a Secure Embedded System by Schaumont, P., Hwang, D., Shenglin Yang, Verbauwhede, I.

    Published in IEEE transactions on computers (01-11-2006)
    “…In this paper, we present the simulation-based validation approach that we used during the design of ThumbPod-2, a portable fingerprint authentication system…”
    Get full text
    Journal Article
  19. 19

    A Cost-Effective Latency-Aware Memory Bus for Symmetric Multiprocessor Systems by Jongsun Kim, Bo-Cheng Lai, Chang, M.-C.F., Verbauwhede, I.

    Published in IEEE transactions on computers (01-12-2008)
    “…This paper presents how a multi-core system can benefit from the use of a latency-aware memory bus capable of dual-concurrent data transfers on a single wire…”
    Get full text
    Journal Article
  20. 20

    HW/SW co-design for public-key cryptosystems on the 8051 micro-controller by Sakiyama, K., Batina, L., Preneel, B., Verbauwhede, I.

    Published in Computers & electrical engineering (01-09-2007)
    “…It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This…”
    Get full text
    Journal Article