Enrique San Millán

Learn More
1 In order to obtain more secure and reliable systems, the vast majority of RFID protocols include a Pseudorandom Number Generator (PRNG) in its design. However, the authors often do not specify the PRNG to use and standard solutions exceed the capabilities of low-cost RFID tags. In this paper, we propose two lightweight PRNGs (AKARI-1 and AKARI-2) that(More)
In this work a generalization of the structural Redundancy Addition and Removal (RAR) logic optimization method is presented. New concepts based on the functional description of the nodes in the network are introduced to support this generalization. Necessary and sufficient conditions to identify all the possible structural expansions are given for the(More)
This paper presents a new integrated approach to logic optimization for sequential circuits. The approach is based on the redundancy addition and removal algorithm, which is based on automatic test pattern generation (ATPG) techniques, and improves it using symbolic techniques based on BDDs. The advantage of the integrated approach lies in the ability of(More)
True random number generators (TRNGs) are the basic building blocks of cryptographic implementations. They are used to generate random numbers required for security protocols, to generate ephemeral keys, and are often used in hiding or masking countermeasures to thwart implementation attacks. The protection of TRNGs is an important issue to guarantee the(More)
In RFID protocols, random numbers are mainly required to anonymize tag answers in order to guarantee the privacy of the owner of the transponder. Our analysis looks at the feasibility of RFID tags for supporting Cryptographically Secure Pseudorandom Number Generators (CS-PRNG) on their limited chip. Specifically, we study the implementation of the(More)
Self checking design based on unordered codes requires that the target circuit is transformed into un unidirectional circuit. Techniques fo r the design of unidirectional circuits have been proposed. However, in general, niultilevel logic optimization techniques cannot be directly applied because they do not guaranty the unidirectional property is(More)