Emanuel M. Popovici

Learn More
This paper presents an energy-efficient medium access control protocol suitable for communication in a wireless body area network for remote monitoring of physiological signals such as EEG and ECG. The protocol takes advantage of the static nature of the body area network to implement the effective time-division multiple access (TDMA) strategy with very(More)
In this paper the benefits of implementation of the Tate pair-ing computation in dedicated hardware are discussed. The main observation lies in the fact that arithmetic architectures in the extension field GF (3 6m) are good candidates for parallelization, leading to a similar calculation time in hardware as for operations over the base field GF (3 m).(More)
There has been a lot of interest in recent years in the problems faced by cryptosystems due to side channel attacks. Algorithms for elliptic curve point scalar multiplication such as the double-and-add method are prone to such attacks. By making use of special addition chains, it is possible to implement a Simple Power Analysis (SPA) resistant cryptosystem.(More)
Access to the full text of the published version may require a subscription. Abstract: The GENESI project has the ambitious goal of bringing WSN technology to the level where it can provide the core of the next generation of systems for structural health monitoring that are long lasting, pervasive and totally distributed and autonomous. This goal requires(More)
—We designed, implemented, tested and measured an ultra low power Wake Up Receiver (WUR), intended for use in Wireless Body Area Networks (WBAN). Gaussian On-Off Keying (GOOK) and Pulse Width Modulation (PWM) are used to modulate and encode, respectively, the preamble signal. The receiver incorporates a decoder to enable Serial Peripheral Interface (SPI).(More)
In this paper we present an Elliptic Curve Point Multiplication processor over base fields GF(2 m), suitable for use in a wide range of commercial cryptography applications. Our design operates in a polynomial basis is fully parameterizable in the irreducible polynomial and the chosen Elliptic Curve over any base Galois Field up to a given size. High(More)
Security in wireless sensor networks is currently provided through symmetric key cryptography. Although the low computational complexity involved in private key algorithms is advantageous, session keys must be embedded in the sensor nodes before the nodes can be deployed. Protocols are also necessary to ensure synchronization of keys between the devices on(More)