7 results on '"Ege B"'
Search Results
2. Challenges in designing trustworthy cryptographic co-processors
- Author
-
Graves, R., Natale, G. Di, Batina, L., Bhasin, S., Ege, B., Fournaris, A., Mentens, N., Picek, S., Regazzoni, F., Rozic, V., Sklavos, N., Bohan, Y., Silva, M. de Medeiros, Conception et Test de Systèmes MICroélectroniques (SysMIC), Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM), Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM), Institute for Computing and Information Sciences [Nijmegen] (ICIS), Radboud university [Nijmegen], Télécom ParisTech, Laboratoire Traitement et Communication de l'Information (LTCI), Télécom ParisTech-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Department of Electrical and Computer Engineering [Patras] (ECE), University of Patras [Patras], Faculty of Informatics [Lugano], Università della Svizzera italiana = University of Italian Switzerland (USI), European Project: IC1204,TRUDEVICE, Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS), Radboud University [Nijmegen], University of Patras, and Silva, M. de Medeiros
- Subjects
Cryptographic primitive ,Random number generation ,business.industry ,Computer science ,Cryptography ,02 engineering and technology ,Cryptographic protocol ,Computer security ,computer.software_genre ,020202 computer hardware & architecture ,Random number generator attack ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Security of cryptographic hash functions ,Digital Security ,[SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/Microelectronics ,Elliptic curve cryptography ,business ,computer ,Vulnerability (computing) - Abstract
International audience; Security is becoming ubiquitous in our society. However, the vulnerability of electronic devices that implement the needed cryptographic primitives has become a major issue. This paper starts by presenting a comprehensive overview of the existing attacks to cryptography implementations. Thereafter, the state-of-the-art on some of the most critical aspects of designing cryptographic co-processors are presented. This analysis starts by considering the design of asymmetrical and symmetrical cryptographic primitives, followed by the discussion on the design and online testing of True Random Number Generation. To conclude, techniques for the detection of Hardware Trojans are also discussed.
- Published
- 2015
- Full Text
- View/download PDF
3. Improving DPA Resistance of S-boxes: How far can we go?
- Author
-
Ege, B., Papagiannopoulos, K., Batina, L., Picek, S., Silva de Medeiros, M., and Silva de Medeiros, M.
- Subjects
Engineering ,Resistance ,Software ,Phantoms ,Ciphers ,Hardware ,business.industry ,Heuristic ,Carry (arithmetic) ,s-box ,DPA resistance ,Context (language use) ,Cryptography ,Power analysis ,Embedded system ,Digital Security ,Differential (infinitesimal) ,business ,Field-programmable gate array - Abstract
Side-channel analysis (SCA) is an important issue for numerous embedded cryptographic devices that carry out secure transactions on a daily basis. Consequently, it is of utmost importance to deploy efficient countermeasures. In this context, we investigate the intrinsic side-channel resistance of lightweight cryptographic S-boxes. We propose improved versions of S-boxes that offer increased power analysis resistance, whilst remaining secure against linear and differential cryptanalyses. To evaluate the side-channel resistance, we work under the Confusion Coefficient model [1] and employ heuristic techniques to produce those improved S-boxes. We evaluate the proposed components in software (AVR microprocessors) and hardware (SASEBO FPGA). Our conclusions show that the model and our approach are heavily platform-dependent and that different principles hold for software and hardware implementations.
- Published
- 2015
4. Clock Glitch Attacks in the Presence of Heating
- Author
-
Ege, B., Korak, T., Hutter, M., Batina, L., Bilof, R., and Bilof, R.
- Subjects
business.industry ,Computer science ,Opcode ,Non invasive ,Hardware_PERFORMANCEANDRELIABILITY ,Fault (power engineering) ,Glitch ,Power (physics) ,Microcontroller ,Time frame ,Embedded system ,Digital Security ,business ,Field-programmable gate array - Abstract
Fault attacks have been widely studied in the past but most of the literature describes only individual fault-injection techniques such as power/clock glitches, EM pulses, optical inductions, or heating/cooling. In this work, we investigate combined fault attacks by performing clock-glitch attacks under the impact of heating. We performed practical experiments on an 8-bit AVR microcontroller which resulted in the following findings. First, we identified that the success rate of glitch attacks performed at an ambient temperature of 100°C is higher than under room temperature. We were able to induce more faults and significantly increase the time frame when the device is susceptible to glitches which makes fault attacks easier to perform in practice. Second, and independently of the ambient temperature, we demonstrate that glitches cause individual instructions to repeat, we are able to add new random instructions, and we identified that opcode gets modified such that address registers of individual instructions get changed. Beside these new results, this is the first work that reports results of combined glitch and thermo attacks.
- Published
- 2014
- Full Text
- View/download PDF
5. Dietary recommendations for lightweight block ciphers: Power, energy and area analysis of recently developed architectures
- Author
-
Batina, L., Das, A., Ege, B., Kavun, E.B., Mentens, N., Paar, C., Verbauwhede, I., Yalçın, T., Hutter, M., Schmidt, J.-M., Hutter, Michael, Schmidt, Jörn-Marc, Hutter, M., and Schmidt, J.-M.
- Subjects
Computer science ,business.industry ,Energy consumption ,computer.software_genre ,cosic ,Power (physics) ,Computer engineering ,Key (cryptography) ,Lecture Notes in Computer Science ,Compiler ,Digital Security ,Telecommunications ,business ,computer ,Energy (signal processing) ,Block cipher ,Block (data storage) ,ModelSim - Abstract
© Springer-Verlag Berlin Heidelberg 2013. In this paper we perform a comprehensive area, power, and energy analysis of some of the most recently-developed lightweight block ciphers and we compare them to the standard AES algorithm. We do this for several different architectures of the considered block ciphers. Our evaluation method consists of estimating the pre-layout power consumption and the derived energy using Cadence Encounter RTL Compiler and ModelSIM simulations. We show that the area is not always correlated to the power and energy consumption, which is of importance for mobile battery-fed devices. As a result, this paper can be used to make a choice of architecture when the algorithm has already been fixed; or it can help deciding which algorithm to choose based on energy and key/block length requirements. ispartof: pages:103-112 ispartof: Lecture Notes in Computer Science vol:8262 LNCS pages:103-112 ispartof: Workshop on RFID Security 2013 date:9 Jul - 11 Jul 2013 status: published
- Published
- 2013
6. Congenital heart disease and Robinow syndrome
- Author
-
Semra Atalay, Ege B, Ocal B, Halil Gümüş, Suskan E, and Imamoğlu A
- Subjects
Heart Defects, Congenital ,medicine.medical_specialty ,Heart disease ,Limb Deformities, Congenital ,Heart defect ,Ventricular Outflow Obstruction ,Pathology and Forensic Medicine ,Internal medicine ,medicine ,Humans ,Abnormalities, Multiple ,cardiovascular diseases ,Tricuspid atresia ,Genetics (clinical) ,business.industry ,Infant ,Syndrome ,General Medicine ,medicine.disease ,Robinow syndrome ,Face ,Pediatrics, Perinatology and Child Health ,cardiovascular system ,Cardiology ,Female ,Anatomy ,business - Abstract
We present a 6-month-old infant with Robinow syndrome and tricuspid atresia (type Ia). Up to now, at least 67 cases of Robinow syndrome have been published including nine cases with a congenital heart defect (CHD). As in our case, the majority of the CHD were right ventricular outflow obstruction. Robinow syndrome with CHD is not rare and in all cases of Robinow syndrome detailed cardiologic evaluation and echocardiography should be performed.
- Published
- 1993
- Full Text
- View/download PDF
7. The Effect of Ozone Gas on IL-1 beta and IL-10 Levels of Gingival Crevicular Fluid in Aggressive Periodontitis Patients
- Author
-
Ömer Poyraz, Bilal Ege, Ebru Dumlupınar, Metin Çalişir, Ahmet Cemil Talmaç, and Çalışır, M., Department of Periodontology, Faculty of Dentistry, Adiyaman University, Adiyaman, Turkey -- Talmac, A.C., Department of Periodontology, Faculty of Dentistry, Yuzuncu Yil University, Van, Turkey -- Ege, B., Department of Oral and Maxillofacial Surgery, Faculty of Dentistry, Adiyaman University, Adiyaman, Turkey -- Poyraz, Ö., Department of Microbiology, Faculty of Medicine, Cumhuriyet University, Sivas, Turkey -- Dumlupınar, E., Department of Biostatistics, Faculty of Medicine, Adiyaman University, Adiyaman, Turkey
- Subjects
medicine.medical_specialty ,Environmental Engineering ,Ozone ,02 engineering and technology ,010501 environmental sciences ,01 natural sciences ,Gastroenterology ,environment and public health ,Crevicular fluid ,chemistry.chemical_compound ,020401 chemical engineering ,Internal medicine ,medicine ,Environmental Chemistry ,Aggressive periodontitis ,0204 chemical engineering ,0105 earth and related environmental sciences ,clinical periodontal parameters ,business.industry ,Ozone therapy ,medicine.disease ,Clinical trial ,Interleukin 10 ,ozone ,chemistry ,IL-10 ,IL-1? ,business - Abstract
Although the use of ozone therapy in dentistry has become widespread, the number of controlled clinical trials evaluating its effectiveness in periodontal therapy is limited. The aim of this study was to evaluate the efficacy of ozone treatment, that is used in concert with scaling and root planning (SRP), on clinical periodontal parameters and to analyze its effect on cytokine levels of GCF in aggressive periodontitis patients. Totally, 27 patients with aggressive periodontitis were randomly selected into groups of treatment with either subgingival SRP followed by application of ozone with a periodontal probe (SRP+ozone) or subgingival SRP followed by irrigation with serum irrigation (SRP-control). The following parameters were evaluated at baseline (T0), and 6 weeks (T1): plaque index (PI); gingival index (GI); probing pocket depth (PPD), clinical attachment loss (CAL), GCF volume, GCF Interleukin-1? (IL-1?), and GCF Interleukin-10 (IL-10) cytokine levels. There was a significant difference in terms of clinical periodontal parameters before and after treatment in both groups. When comparing between groups, there was no significant difference between the treatment methods after 6 weeks with respect to the PI, PPD, CAL, and GCF IL-10 levels. In contrast, GI, GCF volume, and GCF IL-1? levels were statistically significantly different between the two groups at the 6th week after treatment. Application of ozone as an adjunctive therapy to SRP was shown to provide a statistically significant improvement in treatment results compared to SRP plus serum irrigation. © 2019, © 2019 International Ozone Association.
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.