Challenges in Designing Trustworthy Cryptographic Co-Processors

Abstract : Security is becoming ubiquitous in our society. However, the vulnerability of electronic devices that implement the needed cryptographic primitives has become a major issue. This paper starts by presenting a comprehensive overview of the existing attacks to cryptography implementations. Thereafter, the state-of-the-art on some of the most critical aspects of designing cryptographic co-processors are presented. This analysis starts by considering the design of asymmetrical and symmetrical cryptographic primitives, followed by the discussion on the design and online testing of True Random Number Generation. To conclude, techniques for the detection of Hardware Trojans are also discussed.
Type de document :
Communication dans un congrès
ISCAS: International Symposium on Circuits and Systems, May 2015, Lisbon, Portugal. Proceedings of the 2015 IEEE International Symposium on Circuits and Systems (ISCAS), pp.2009-2010, 2015, 〈10.1109/ISCAS.2015.7169070〉
Liste complète des métadonnées

https://hal-lirmm.ccsd.cnrs.fr/lirmm-01234083
Contributeur : Giorgio Di Natale <>
Soumis le : jeudi 26 novembre 2015 - 11:08:07
Dernière modification le : jeudi 11 janvier 2018 - 06:27:19

Identifiants

Citation

Ricardo Chaves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, et al.. Challenges in Designing Trustworthy Cryptographic Co-Processors. ISCAS: International Symposium on Circuits and Systems, May 2015, Lisbon, Portugal. Proceedings of the 2015 IEEE International Symposium on Circuits and Systems (ISCAS), pp.2009-2010, 2015, 〈10.1109/ISCAS.2015.7169070〉. 〈lirmm-01234083〉

Partager

Métriques

Consultations de la notice

117