• Publications
  • Influence
FPGA Intrinsic PUFs and Their Use for IP Protection
New protocols for the IP protection problem on FPGAs are proposed and the first construction of a PUF intrinsic to current FPGA based on SRAM memory randomness present on current FFPAs is provided. Expand
Extended abstract: The butterfly PUF protecting IP on every FPGA
A new PUF structure called the butterfly PUF that can be used on all types of FPGAs is proposed and experimental results showing their identification and key generation capabilities are presented. Expand
A Survey of Lightweight-Cryptography Implementations
A selection of recently published lightweight-cryptography implementations are presented and compared to state-of-the-art results in their field, targeting embedded hardware and software. Expand
Optimum Digit Serial GF(2^m) Multipliers for Curve-Based Cryptography
This contribution shows different architectural enhancements in least significant digit (LSD) multiplier for binary fields GF(2m) and proposes two different architectures, the double accumulator multiplier (DAM) and N-accumulators multiplier (NAM), which are both faster compared to traditional LSD multipliers. Expand
Securing the Internet of Things: A Standardization Perspective
An in-depth review of the communication security solutions for IoT, specifically the standard security protocols to be used in conjunction with the Constrained Application Protocol (CoAP), an application protocol specifically tailored to the needs of adapting to the constraints of IoT devices. Expand
Security Challenges in the IP-based Internet of Things
This paper discusses the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things, and presents challenges and requirements for IP-based security solutions. Expand
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID ?
With elliptic curve cryptography emerging as a serious alternative, the desired level of security can be attained with significantly smaller key sizes. This makes ECC very attractive forExpand
Security Considerations in the IP-based Internet of Things
This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing, and presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Expand
Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications
The possibility to use the equations of the field GF(2): xi2= xi that are also quadratic, makes that the XL algorithm works better, and two improved versions of XL are introduced, called XL' and XL2, with an improved final step of the algorithm (that also can be used in XSL). Expand
Use Cases for Authentication and Authorization in Constrained Environments
These use cases aim at identifying authorization problems that arise during the life cycle of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and authorization solution for this class of scenarios. Expand