Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content

    Nele Mentens

    This paper presents a pipelined architecture of a modu- lar Montgomery multiplier, which is suitable to be used in public key coprocessors. Starting from a baseline imple- mentation of the Montgomery algorithm, a more compact pipelined... more
    This paper presents a pipelined architecture of a modu- lar Montgomery multiplier, which is suitable to be used in public key coprocessors. Starting from a baseline imple- mentation of the Montgomery algorithm, a more compact pipelined version is derived. The design makes use of 16- bit integer multiplication blocks that are available on re- cently manufactured FPGAs. The critical path
    This paper presents a reconfigurable hardware architecture for Public-key cryptosystems. By changing the connections of coarse grain Carry-Save Adders (CSAs), the datapath provides a high perfor- mance for both RSA and Elliptic Curve... more
    This paper presents a reconfigurable hardware architecture for Public-key cryptosystems. By changing the connections of coarse grain Carry-Save Adders (CSAs), the datapath provides a high perfor- mance for both RSA and Elliptic Curve Cryptography (ECC). In addi- tion, we introduce another reconfigurability for the flip-flops in order to make the best of hardware resources. The results of FPGA implemen- tation
    This work describes the smallest known hard- ware implementation for Elliptic/Hyperelliptic Curve Cryptog- raphy (ECC/HECC). We propose two solutions for Public- key Cryptography (PKC), which are based on arithmetic on... more
    This work describes the smallest known hard- ware implementation for Elliptic/Hyperelliptic Curve Cryptog- raphy (ECC/HECC). We propose two solutions for Public- key Cryptography (PKC), which are based on arithmetic on elliptic/hyperelliptic curves. One solution relies on ECC over binary fields F2n where n is a composite number of the form 2p (p is a prime) and another on HECC on
    Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through side- channels. Sensitive information, such as secret keys, can be obtained by observing the power consumption, the elec-... more
    Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through side- channels. Sensitive information, such as secret keys, can be obtained by observing the power consumption, the elec- tromagnetic radiation, etc. This class of attacks are called side-channel attacks. Another type of attacks, namely fault attacks, reveal secret information by inserting faults into
    ABSTRACT With the widespread availability of broadband Internet, Field-Programmable Gate Arrays (FPGAs) can get remote updates in the field. This provides hardware and software updates, and enables issue solving and upgrade ability... more
    ABSTRACT With the widespread availability of broadband Internet, Field-Programmable Gate Arrays (FPGAs) can get remote updates in the field. This provides hardware and software updates, and enables issue solving and upgrade ability without device modification. In order to prevent an attacker from eavesdropping or manipulating the configuration data, security is a necessity. This work describes an architecture that allows the secure, remote reconfiguration of an FPGA. The architecture is partially dynamically reconfigurable and it consists of a static partition that handles the secure communication protocol and a single reconfigurable partition that holds the main application. Our solution distinguishes itself from existing work in two ways: it provides entity authentication and it avoids the use of a trusted third party. The former provides protection against active attackers on the communication channel, while the latter reduces the number of reliable entities. Additionally, this work provides basic countermeasures against simple power-oriented side-channel analysis attacks. The result is an implementation that is optimized toward minimal resource occupation. Because configuration updates occur infrequently, configuration speed is of minor importance with respect to area. A prototype of the proposed design is implemented, using 5, 702 slices and having minimal downtime.
    The aim of this chapter is to give a thorough overview of secure remote reconfiguration technologies for wireless embedded systems, and of the communication standard commonly used in those systems. In particular, we focus on basic... more
    The aim of this chapter is to give a thorough overview of secure remote reconfiguration technologies for wireless embedded systems, and of the communication standard commonly used in those systems. In particular, we focus on basic security mechanisms both at hardware and ...
    This paper describes the protocol, architecture, and implementation details of an {FPGA-based} embedded system that is able to remotely reconfigure the {FPGA}, using a {TCP/IP} connection, in a secure way. When considering the security... more
    This paper describes the protocol, architecture, and implementation details of an {FPGA-based} embedded system that is able to remotely reconfigure the {FPGA}, using a {TCP/IP} connection, in a secure way. When considering the security aspects, we imply data confidentiality, explicit key authentication and data origin authentication. Since these aspects are overhead for the main application, the system is to be
    ABSTRACT Polynomial multiplication is the basic and most computationally intensive operation in ring-learning with errors (ring-LWE) encryption and "somewhat" homomorphic encryption (SHE) cryptosystems. In this paper,... more
    ABSTRACT Polynomial multiplication is the basic and most computationally intensive operation in ring-learning with errors (ring-LWE) encryption and "somewhat" homomorphic encryption (SHE) cryptosystems. In this paper, the fast Fourier transform (FFT) with a linearithmic complexity of O(nlogn), is exploited in the design of a high-speed polynomial multiplier. A constant geometry FFT datapath is used in the computation to simplify the control of the architecture. The contribution of this work is three-fold. First, parameter sets which support both an efficient modular reduction design and the security requirements for ring-LWE encryption and SHE are provided. Second, a versatile pipelined architecture accompanied with an improved dataflow are proposed to obtain a high-speed polynomial multiplier. Third, the proposed architecture supports polynomial multiplications for different lengths n and moduli p. The experimental results on a Spartan-6 FPGA show that the proposed design results in a speedup of 3.5 times on average when compared with the state of the art. It performs a polynomial multiplication in the ring-LWE scheme (n=256,p=1049089) and the SHE scheme (n=1024,p=536903681) in only 6.3 μs and 33.1 μs, respectively.