Abstract
Smart city or smart grid, e-Health, e-ID, e-government, e-mobility and many more e-trends are societal moves coming to us. None of them will however become a reality without secure, efficient, embedded implementations of cryptographic algorithms into the electronic devices that support these society changers.
Similar content being viewed by others
References
Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede and Christophe Geuens, “PrETP: Privacy-Preserving Electronic Toll Pricing”, USENIX Security Symposium 2010.
Dan Boneh, “Twenty years of attacks on the RSA cryptosystem,” Notise of the American Mathematical Society (AMS), Vol 46, no. 2, pp. 203–213, 1999.
J. Fan, X. Guo, E. De Mulder, P. Schaumont, B. Preneel, and I. Verbauwhede, “State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures,” In 3rd IEEE International Symposium on Hardware-Oriented Security and Trust — HOST 2010, IEEE, pp. 76–87, 2010.
K. Fu, “Inside risks, reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care,” Communications of the ACM, 52(6):25–27, June 2009.
Shay Gueron, “Intel Set — Rev 3.01.” Last retrieved from http://software.intel.com/sites/default/files/article/165683/aes-wp-2012-09-22-v01.pdf.
J. Hermans, A. Pashalidis, F. Vercauteren, and B. Preneel, “A New RFID Privacy Model,” In 2011st European Symposium on Research in Computer Security (ESORICS 2011), Lecture Notes in Computer Science 6879, V. Atluri, and C. Diaz (eds.), Springer-Verlag, pp. 568–587, 2011.
Klaus Kursawe, George Danezis, Markulf Kohlweiss: Privacy-Friendly Aggregation for the Smart-Grid. Privacy Enhancing Technologies — 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27–29, 2011. ISBN 978-3-642-22262-7: pages 175–191.
Stefan Mangard, Elisabeth Oswald, and Thomas Popp, “Power Analysis Attacks — Revealing the Secrets of Smart Cards,” 2007, Springer.
C. Schnorr, “Efficient Identification and Signatures for Smart Cards,” In Gilles Brassard, editor, Advances in Cryptology — CRYPTO’ 89 Proceedings, volume 435 of LNCS, pp. 239–252, 1990.
K. Tiri, and I. Verbauwhede, “A Digital Design Flow for Secure Integrated Circuits,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 25(7), pp. 1197–1208, 2006.
I. Verbauwhede, D. Karaklajic, and J. Schmidt, “The Fault Attack Jungle — A Classification Model to Guide You,” In International Workshop on Fault Diagnosis and Tolerance in Cryptography 2011, IEEE, pp. 3–8, 2011.
Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, “Elliptic-curve based security processor for RFID,” IEEE Trans. Computers, vol. 57, no. 11, pp. 1514–1527, 2008.
Additional information
Dr. Ingrid Verbauwhede is a professor in the COSIC research group at the KU Leuven, Belgium and an adjunct professor in the EE department of UCLA, CA. She is a Member of IACR, a Senior Member of IEEE and a member of the Royal Flemish Academy of Belgium for Science and the Arts.
Rights and permissions
About this article
Cite this article
Verbauwhede, I. Efficient and secure hardware. Datenschutz Datensich 36, 872–875 (2012). https://doi.org/10.1007/s11623-012-0293-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-012-0293-1