Search Results - "Verbauwhede, I."
-
1
Unveiling the Vulnerability of Oxide-Breakdown-Based PUF
Published in IEEE electron device letters (01-05-2024)“…This work reports a potential vulnerability of an oxide-breakdown-based Physical Unclonable Function (PUF). This generates a unique chip key based on the…”
Get full text
Journal Article -
2
Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors
Published in IEEE transactions on computers (01-04-2006)“…This paper explores the area-throughput trade-off for an ASIC implementation of the advanced encryption standard (AES). Different pipelined implementations of…”
Get full text
Journal Article -
3
Elliptic-Curve-Based Security Processor for RFID
Published in IEEE transactions on computers (01-11-2008)“…RFID (radio frequency identification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide…”
Get full text
Journal Article -
4
A digital design flow for secure integrated circuits
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-07-2006)“…Small embedded integrated circuits (ICs) such as smart cards are vulnerable to the so-called side-channel attacks (SCAs). The attacker can gain information by…”
Get full text
Journal Article -
5
Exploiting Bias Temperature Instability for Reservoir Computing in Edge Artificial Intelligence Applications
Published in 2024 IEEE International Reliability Physics Symposium (IRPS) (14-04-2024)“…In this paper, we utilize Negative Bias Temperature Instability (NBTI) effect in pFETs as a computing mechanism. Specifically, NBTI is capable of implementing…”
Get full text
Conference Proceeding -
6
Design and performance testing of a 2.29-GB/s Rijndael processor
Published in IEEE journal of solid-state circuits (01-03-2003)“…This contribution describes the design and performance testing of an Advanced Encryption Standard (AES) compliant encryption chip that delivers 2.29 GB/s of…”
Get full text
Journal Article -
7
X-Ray and Proton Radiation Effects on 40 nm CMOS Physically Unclonable Function Devices
Published in IEEE transactions on nuclear science (01-08-2018)“…Total ionizing dose effects are investigated on a physically unclonable function (PUF) based on CMOS breakdown. Devices irradiated to 2 Mrad(SiO 2 ) show less…”
Get full text
Journal Article -
8
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n)
Published in IEEE transactions on computers (01-09-2007)“…This paper presents a reconfigurable curve-based cryptoprocessor that accelerates scalar multiplication of Elliptic Curve Cryptography (ECC) and HyperElliptic…”
Get full text
Journal Article -
9
Dependence of RFID Reader Antenna Design on Read Out Distance
Published in IEEE transactions on antennas and propagation (01-12-2008)“…The design of a reader antenna is described for usage in radio frequency identification (RFID) systems at 13.56 MHz, as defined in the ISO-14443a standard. It…”
Get full text
Journal Article -
10
Design of an Interconnect Architecture and Signaling Technology for Parallelism in Communication
Published in IEEE transactions on very large scale integration (VLSI) systems (01-08-2007)“…The need for efficient interconnect architectures beyond the conventional time-division multiplexing (TDM) protocol-based interconnects has been brought on by…”
Get full text
Journal Article -
11
Advanced RF/baseband interconnect schemes for inter- and intra-ULSI communications
Published in IEEE transactions on electron devices (01-07-2005)“…Future inter- and intra-ULSI interconnect systems demand extremely high data rates (up to 100 Gbps/pin or 20-Tbps aggregate) as well as bidirectional multiI/O…”
Get full text
Journal Article -
12
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
Published in Computers & electrical engineering (01-09-2007)“…This paper describes the first differential power and electromagnetic analysis attacks performed on a hardware implementation of an elliptic curve…”
Get full text
Journal Article -
13
Domain-specific codesign for embedded security
Published in Computer (Long Beach, Calif.) (01-04-2003)“…Systems with multiple design domains require codesign of application domains. Dedicated hardware processors implement the application domains and software…”
Get full text
Journal Article -
14
A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs
Published in Design, Automation and Test in Europe (01-01-2005)“…This paper presents a digital VLSI design flow to create secure, side-channel attack (SCA) resistant integrated circuits. The design flow starts from a normal…”
Get full text
Conference Proceeding -
15
Low-cost implementations of on-the-fly tests for random number generators
Published in 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-03-2012)“…Random number generators (RNG) are important components in various cryptographic systems. Embedded security systems often require a high-quality digital source…”
Get full text
Conference Proceeding -
16
High-throughput programmable cryptocoprocessor
Published in IEEE MICRO (01-05-2004)“…High-speed Internet protocol security (IPsec) applications require high throughput and flexible security engines. A loosely coupled cryptocoprocessor based on…”
Get full text
Journal Article -
17
Reconfigurable modular arithmetic logic unit supporting high-performance RSA and ECC over GF( p )
Published in International journal of electronics (01-05-2007)“…This paper presents a reconfigurable hardware architecture for public-key cryptosystems. By changing the connections of coarse grain carry-save adders (CSAs),…”
Get full text
Journal Article Conference Proceeding -
18
Multilevel Design Validation in a Secure Embedded System
Published in IEEE transactions on computers (01-11-2006)“…In this paper, we present the simulation-based validation approach that we used during the design of ThumbPod-2, a portable fingerprint authentication system…”
Get full text
Journal Article -
19
A Cost-Effective Latency-Aware Memory Bus for Symmetric Multiprocessor Systems
Published in IEEE transactions on computers (01-12-2008)“…This paper presents how a multi-core system can benefit from the use of a latency-aware memory bus capable of dual-concurrent data transfers on a single wire…”
Get full text
Journal Article -
20
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Published in Computers & electrical engineering (01-09-2007)“…It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This…”
Get full text
Journal Article