Search For:

Displaying 1-5 out of 5 total
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
Found in: IEEE Transactions on Computers
By Andrey Bogdanov,Miroslav Knezevic,Gregor Leander,Deniz Toz,Kerem Varici,Ingrid Verbauwhede
Issue Date:October 2013
pp. 2041-2053
The design of secure yet efficiently implementable cryptographic algorithms is a fundamental problem of cryptography. Lately, lightweight cryptography--optimizing the algorithms to fit the most constrained environments--has received a great deal of attenti...
 
Low Cost Built in Self Test for Public Key Crypto Cores
Found in: Fault Diagnosis and Tolerance in Cryptography, Workshop on
By Duško Karaklajic, Miroslav Kneževic, Ingrid Verbauwhede
Issue Date:August 2010
pp. 97-103
The testability of cryptographic cores brings an extra dimension to the process of digital circuits testing security. The benefits of the classical methods such as the scan-chain method introduce new vulnerabilities concerning the data protection. The Buil...
 
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
Found in: IEEE Transactions on Computers
By Miroslav Knežević, Frederik Vercauteren, Ingrid Verbauwhede
Issue Date:December 2010
pp. 1715-1721
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable for hardware implementations. Four large sets of moduli for which the propos...
 
FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags
Found in: On-Line Testing Symposium, IEEE International
By Junfeng Fan, Miroslav Knezevic, Dusko Karaklajic, Roel Maes, Vladimir Rozic, Lejla Batina, Ingrid Verbauwhede
Issue Date:June 2009
pp. 189-191
Testing of cryptographic chips or components has one extra dimension: physical security. The chip designers should improve the design if it leaks too much information through side-channels, such as timing, power consumption, electric-magnetic radiation, an...
 
Demonstration of unobservable voice over IP
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Miroslav Knezevic, Vesselin Velichkov
Issue Date:June 2008
pp. 1-3
We describe UV: a two-node system for unobservable voice communication on the Internet. UV provides unobservability of communication by hiding the fact that there is a conversation taking place. To achieve this, the system uses techniques such as encryptio...
 
 1