Simon Pontie

Learn More
Embedded systems are increasingly providing secure functionalities, which often rely on some dedicated hardware for symmetric and public-key cryptography. When resources are limited, elliptic curve cryptography (ECC) may be chosen instead of the more widely known RSA, which needs much longer keys for the same security level. However, ECC may be vulnerable,(More)
Crypto-processors must be protected against various types of attacks to secure the access to the secret information. In the case of Elliptic Curve Cryptography (ECC), Simple Power Analysis (SPA) can be very efficient to recover the secret key if no protection is implemented. However, lightweight implementations necessary in Internet of Things (IoT) objects(More)
High-Level Synthesis (HLS) is used by hardware developers to achieve higher abstraction in circuit descriptions. In order to shorten the hardware development time via HLS, we present an adjustment of the Iterative and Incremental Design (IID) methodology, frequently used in software development. In particular, our methodology is relevant for the development(More)
  • 1