Paolo Maistri. September 8, Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3

Size: px
Start display at page:

Download "Paolo Maistri. September 8, 2008. Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3"

Transcription

1 CURRICULUM VITAE ET STUDIORUM Paolo Maistri September 8, 2008 TABLE OF CONTENTS Personal Information 2 Education and Studies 2 Academic Activities and Affiliations 3 Teaching Activities 4 Teaching Assistance Other Teaching Activities Scientific Activities 5 Peerreviews Oral Presentations ConferencePartecipations Publications 7 International Journals International ConferenceProceedings Theses Book Chapters

2 PERSONAL INFORMATION First Name: Paolo Last Name: Maistri Birth date: June 4th, 1977 Birth place: Milano, Italy Citizenship: Italian Work Address TIMA Laboratory 46, avenue Félix Viallet F Grenoble, Francia Phone: +33(0) Fax: +33(0) Personal Address 38, avenue Félix Viallet F Grenoble, Francia Mobile: +33(0) Languages Italian: native English: fluent French: medium EDUCATION AND STUDIES 07/1995 First Certificate in English (FCE), at Oxford School, Verona, Italy; final grade: B. 05/1999 Test of English as a Foreign Language (TOEFL), at Politecnico di Milano, Milano, Italy; final grade: 263/ / /2001 Master of Science in Computer Science and Electrical Engineering at the University of Illinois at Chicago(UIC), Chicago(IL), USA. Thesis title: Algorithm Analysis for Elliptic Curve Cryptography. Advisor: Prof. V. Piuri. Summary: This work deals with the public-key Elliptic Curve Cryptosystems (ECCs) and evaluates the performance tradeoff between a dedicated unit and an external cryptographic accelerator, connected by means of a dedicated bus. The model is developed at the architecture level. 09/ /2001 Degree in Computer Engineering at Politecnico di Milano, Milano, Italy; final grade: 100/100. Thesis title: Algorithm Analysis for Elliptic Curve Cryptography. Advisor: Prof. V. Piuri. Reviewer: Prof. L. Breveglieri. 2

3 Summary: This work deals with the use of alternative coordinate systems for Elliptic Curves, in particular the Hessian and Jacobian coordinate systems. These were selected to avoid power attacks against ECC. A software implementation (in C language) was developed to compare the performance with respect to affine and homogeneous systems. 03/ /2006 PhD in Information Technology at the Dipartimento di Elettronica e Informazione(Department of Electronics and Computer Science) of Politecnico di Milano, Milano, Italy; final grade: B. Thesis title: Cryptographic Algorithms and Architectures and their Connections with Errors and Reliability. Advisor: Prof. L. Breveglieri. Reviewer: Prof. R. Leveugle(TIMA Laboratory, Grenoble, France). Jury: Prof. Mandrioli Dino, Prof. Blanchini Franco, Prof. Ciaccia Paolo, Prof. Duval Erik. Summary: In this work, cryptographic algorithms and architecture are extended with error detection capabilities by means of codes, to counteract data corruption and to protect against fault attacks. A taxonomy of the main results in Differential Fault Analysis is given, focusinginthelatestfaultattacksagainstaesandrsa.hence,acomplete model is developed for the AES encryption algorithm to describe the error propagation [B15][B17]; an error detection mechanism, based onparitycode,hasbeendesigned[a3]andthenimplementedintwo sample architectures. Overheads and coverage rate were evaluated on VHDL and C code, respectively, and compared to most recent solution currently published in the literature [B10][B11]. The approach was then generalized to symmetric block ciphers and some software models (DES, RC5, IDEA) were implemented to validate the conclusions about suggested code, frequency of checkpoint, redundancy level[b12][b13]. A fault detection mechanism was also implemented in an RSA architecture, which can be particularly exposed to fault attacks. A software model was implemented to evaluate the error coverage of the code, while a VHDL design was developed to evaluate theoverheadsinterms of areaandlatency [B7]. ACADEMIC ACTIVITIES AND AFFILIATIONS 01/ /2002 Contract researcher at the Dipartimento di Elettronica e Informazione of Politecnico di Milano, Milano, Italy. 03/ /2003 Research grant in the European project MEDEA+ CryptoSoc (MEDEA Label A304), at the Dipartimento di Elettronica e Informazione of Politecnico di Milano, Milano, Italy. 03/ /2006 Contract researcher in the Italian project FIRB N. RBNE0193K5 MAIS Multichannel Adaptive Information Systems at the Dipartimento di Elettronica e Informazione of Politecnico di Milano, Milano, Italy. 04/ /2006 Contract researcher at the Dipartimento di Elettronica e Informazione of Politecnico di Milano, Milano, Italy. 06/ /2008 Post-Doc researcher at the TIMA Laboratory, Grenoble, France. 3

4 TEACHING ACTIVITIES TEACHING ASSISTANCE 03/ /2003 Teaching assistance in Informatica II (Computer Science II) held by Prof.ssa Milano, Italy (40 hours). 09/ /2004 Teaching assistance in Metodi e Tecnologie per il Trattamento delle Immagini (Methods and Technologies for Image Processing) held by Prof. R. Negrini for the degree in Computer Engineering, Politecnico di Milano, Milano, Italy (20 hours). 03/ /2004 Teaching assistance in Informatica II (Computer Science II) held by Prof.ssa Milano, Italy (40 hours). 09/ /2005 Teaching assistance in Metodi e Tecnologie per il Trattamento delle Immagini (Methods and Technologies for Image Processing) held by Prof. R. Negrini for the degree in Computer Engineering, Politecnico di Milano, Milano, Italy (20 hours). 09/ /2005 Teaching assistance in Reti Logiche A (Digital Design) held by Prof.ssa Milano, Italy (20 hours). 03/ /2005 Teaching assistance in Informatica II (Computer Science II) held by Prof.ssa Milano, Italy (40 hours). 09/ /2006 Teaching assistance in Reti Logiche A (Digital Design) held by Prof.ssa Milano, Italy (20 hours). 03/ /2006 Teaching assistance in Informatica II (Computer Science II) held by Prof.ssa Milano, Italy (40 hours) /2008 Teaching assistance in Hardware and embedded systems held by Prof. Régis Leveugle for the Master M2 Crypto, Institut Polytechnique Grenoble, Grenoble, France(20 hours). OTHER TEACHING ACTIVITIES 03/ /2002 Assistant for Computer Laboratory for Informatica II held by Prof. Luca Breveglieri for the degree in Automation Engineering at Politecnico di Milano, Milano, Italy. 09/ /2003 Computer Laboratory for Informatica I held by Prof. Luca Breveglieri for the degree in Automation Engineering at Politecnico di Milano, Milano, Italy. 09/ /2004 Computer Laboratory for Informatica I held by Prof. Luca Breveglieri for the degree in Automation Engineering at Politecnico di Milano, Milano, Italy. 4

5 SCIENTIFIC ACTIVITIES PEER REVIEWS 2008 IEEE International Conference on Circuits and Systems for Communications IEEE Transaction on Computers Workshop on Fault Diagnosis and Tolerance in Cryptography IET Circuits, Devices & Systems International Conference on Design, Automation and Test in Europe(DATE) International Conference on Application-Specific Systems, Architectures and Processors (ASAP). ORAL PRESENTATIONS 07/2002 On the Propagation of Faults and their Detection in a Hardware Implementation of the Advanced Encryption Standard at the International Conference on Application-Specific Systems, Architectures and Processors, San José(CA), USA. 06/2003 Concurrent Fault Detection in a Hardware Implementation of the RC5 Encryption Algorithm at the International Conference on Application-Specific Systems, Architectures and Processors, The Hague, Olanda. 06/2004 Detecting Faults in Integer and Finite Field Arithmetic Operations for Cryptography, at the Workshop on Fault Diagnosis and Tolerance in Cryptography, Firenze, Italia. 08/2004 Efficient Hardware-Based Fault Diagnosis Scheme for AES, at the Rump Session of the International Workshop on Cryptographic Hardware and Embedded Systems(CHES), Boston (MA), USA. 09/2004 Detecting Faults in Four Symmetric Key Block Ciphers at the International Conference on Application-Specific Systems, Architectures and Processors, Galveston(TX), USA. 10/2004 An Efficient Hardware-Based Fault Diagnosis Scheme for AES: Performances and Cost, at the International Symposium on Defect and Fault Tolerance in VLSI Systems, Cannes, Francia. 10/2004 Dissemination and Architecture Review, at the Final Review of CryptoSoC - Cryptographic System on a Chip, Paris, Francia. 09/2005 Incorporating Error Detection in an RSA Architecture, at the 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2005), Edinbourgh, Scotland(UK). 10/2005 Incorporating Error Detection and Online Reconfiguration into a Regular Architecture for the Advanced Encryption Standard, at the 20th International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT), Monterey(CA), USA. 5

6 07/2006 A Note on Error Detection in an RSA Architecture by means of Residue Codes, at the 12th IEEE International On-Line Testing Symposium (IOLTS), Como, Italy. 09/2007 Evaluation of Register-Level Protection Techniques for the Advanced Encryption Standard by Multi-Level Fault Injections at the 22nd International Symposium on Defect and Fault Tolerance in VLSI Systems(DFT), Rome, Italy. 09/2007 A Novel Double-Data-Rate AES Architecture Resistant against Fault Injection at the International Workshop on Fault Diagnosis and Tolerance in Cryptography(FDTC), Wien, Austria. 07/2008 Software Self-Testing of a Symmetric Cipher with Error Detection Capability at the 14th IEEE International On-Line Testing Symposium 2008(IOLTS 2008), to appear. CONFERENCE PARTECIPATIONS 13rd International Conference on Application-Specific Systems, Architectures and Processors (ASAP), San José (CA), USA, th International Conference on Application-Specific Systems, Architectures and Processors (ASAP), The Hague, Netherlands, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Firenze, Italy, Workshop on Cryptographic Hardware and Embedded Systems (CHES), Boston (MA), USA, th International Conference on Application-Specific Systems, Architectures and Processors (ASAP), Galveston(TX), USA, th International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT), Cannes, France, Workshop on Cryptographic Hardware and Embedded Systems (CHES), Edinbourgh, Scotland(UK), nd International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2005), Edinbourgh, Scotland(UK), th International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT), Monterey(CA), USA, th IEEE International On-Line Testing Symposium (IOLTS), Como, Italy, nd International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT), Rome, Italy, th International Workshop on Fault Diagnosis and Tolerance in Cryptography(FDTC), Wien, Austria, th IEEE International On-Line Testing Symposium (IOLTS), Rhodes, Greece,

7 PUBLICATIONS Note: In most of the following publications the authors are listed in alphabetic order. INTERNATIONAL JOURNALS A1. P. Maistri, R. Leveugle. Double-Data-Rate Computation as a Countermeasure against Fault Analysis ; Computers, IEEE Transactions on, DOI /TC , accepted for future publication. A2. L. Breveglieri; I. Koren; P. MAISTRI. An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers ; Computers, IEEE Transactions on, Volume: 56, Issue: 5, Pages: , May A3. G. Bertoni; L. Breveglieri; I. Koren; P. MAISTRI; V. Piuri. Error analysis and detection procedures for a hardware implementation of the Advanced Encryption Standard ; Computers, IEEE Transactions on, Volume: 52, Issue: 4, Pages: , April INTERNATIONAL CONFERENCE PROCEEDINGS B1. P. Maistri, R. Leveugle. Software BIST Capabilities of a Symmetric Cipher ; 15th IEEE International Conference on Electronics, Circuits, and Systems (ICECS 2008), to appear, B2. P. Maistri, C. Excoffon, R. Leveugle. Software Self-Testing of a Symmetric Cipher with Error Detection Capability ; 14th IEEE International On-Line Testing Symposium (IOLTS 2008), pp , B3. C. Excoffon, P. Maistri, R. Leveugle. Software-Based BIST Capabilities of the Advanced Encryption Standard ; European Test Symposium (ETS 2008). Digital Proceedings, B4. P. Maistri, R. Leveugle. Multi-cycle Fault Injections in Error Detecting Implementations of the Advanced Encryption Standard ; International Design and Test Workshop (IDT). Proceedings. pp , B5. P. Maistri, P. Vanhauwaert, R. Leveugle. Evaluation of Register-Level Protection Techniques for the Advanced Encryption Standard by Multi-Level Fault Injections ; Defect and Fault Tolerance in VLSI Systems, Proceedings. 20th IEEE International Symposium on, pp , B6. P. Maistri, P. Vanhauwaert, R. Leveugle. A Novel Double-Data-Rate AES Architecture Resistant against Fault Injection ; Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp , B7. L. Breveglieri, I. Koren, Paolo Maistri, M. Ravasio. Incorporating Error Detection in an RSA Architecture ; Fault Diagnosis and Tolerance in Cryptography (FDTC 2006), pp , B8. L. Breveglieri, I. Koren, Paolo Maistri. A Fault Attack Against the FOX Cipher Family ; Fault Diagnosis and Tolerance in Cryptography (FDTC 2006), pp , B9. L. Breveglieri, P Maistri, I Koren. A Note on Error Detection in an RSA Architecture by Means of Residue Codes ; International On-Line Testing Symposium (IOLTS 2006), pp ,

8 B10. L. Breveglieri, I. Koren, P. Maistri. Incorporating Error Detection and Online Reconfiguration into a Regular Architecture for the Advanced Encryption Standard ; Defect and Fault Tolerance in VLSI Systems, Proceedings. 20th IEEE International Symposium on, pp , B11. G. Bertoni; L. Breveglieri; I. Koren; P. MAISTRI; An efficient hardware-based fault diagnosis scheme for AES: performances and cost ; Defect and Fault Tolerance in VLSI Systems, Proceedings. 19th IEEE International Symposium on, Pages: , Oct B12. L. Breveglieri; I. Koren; P. Maistri; Detecting faults in four symmetric key block ciphers ; Proceedings. Application-Specific Systems, Architectures, and Processors, Proceedings. IEEE International Conference on, Pages: , Sep B13. L. Breveglieri; I. Koren; P. Maistri; Detecting Faults in Integer and Finite Field Arithmetic Operations for Cryptography ; Workshop on FDTC: Fault Diagnosis and Tolerance in Cryptography, Supplemental Volume of the Proceedings of the Conference on Dependable Systems and Networks, Pages , June B14. A. Antola; G. Bertoni; L. Breveglieri; P. Maistri; Parallel Architectures for Elliptic Curve Cryptoprocessors over Binary Extension Fields ; The 46th IEEE Midwest Symposium On Circuits and Systems. Proceedings B15. G. Bertoni; L. Breveglieri; I. Koren; P. Maistri; V. Piuri; Detecting and locating faults in VLSI implementations of the Advanced Encryption Standard ; Defect and Fault Tolerance in VLSI Systems, Proceedings. 18th IEEE International Symposium on, Pages: , Nov B16. G. Bertoni; L. Breveglieri; I. Koren; P. Maistri; V. Piuri; Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm ; Application-Specific Systems, Architectures, and Processors, 2003.Proceedings. IEEE International Conference on, Pages: , June B17. G. Bertoni; L. Breveglieri; I. Koren; P. Maistri; V. Piuri; A Parity Code Based Concurrent Fault Detection for Implementations of the Advanced Encryption Standard ; Defect and Fault Tolerance in VLSI Systems, Proceedings. 17th IEEE International Symposium on, Pages:51-59, Nov B18. G. Bertoni; L. Breveglieri; I. Koren; P. Maistri; V. Piuri; Modelling and Studying Faults In The Advanced Encryption Standard ; Application-Specific Systems, Architectures, and Processors, Proceedings. IEEE International Conference on, luglio THESES C1. P. Maistri. Algorithm Analysis for Elliptic Curve Cryptography. Master Thesis, Electrical and Computer Engineering, University of Illinois at Chicago, Chicago (IL), USA, C2. P. Maistri. Algorithm Analysis for Elliptic Curve Cryptography. Degree Thesis, Dipartimento di Elettronica e Informazione, Politecnico di Milano, Milano, Italy, C3. P. Maistri. Cryptographic Algorithms and Architectures and their Connections with Errors and Reliability. PhD Thesis, Dipartimento di Elettronica e Informazione, Politecnico di Milano, Milano, Italy,

9 BOOK CHAPTERS C1. D. Barretta, L. Breveglieri, P. MAISTRI, M. Monchiero, L. Negri, A. Pagni, G. Palermo, M. Sami, C. Silvano, O. Villa, R. Zafalon; Low Power Architectures for Mobile Systems, Mobile Information Systems and Infrastructure and design for flexibility and adaptivity, Capitolo 7, C2. G. Bertoni; L. Breveglieri; I. Koren; P. MAISTRI; Error Analysis and Detection Procedures for AES, Industry Days , ISBN , pp , Grenoble, September 8, 2008 Paolo Maistri 9

Martino Sykora CURRICULUM VITAE ET STUDIORUM

Martino Sykora CURRICULUM VITAE ET STUDIORUM Martino Sykora CURRICULUM VITAE ET STUDIORUM Via L. Pasteur, 15 20127 Milano Italy Mob: +39 338 1983694 Mail: martino.sykora@gmail.com Personal Information Birthdate: June 15th, 1978 Birthplace: Basel,

More information

FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM

FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM April 2011 Index Personal details and education 1 Research activities 2 Teaching and tutorial activities 3 Conference organization and review activities

More information

Michele Tartara. Brief summary. Position and Education RECORD OF EMPLOYMENT

Michele Tartara. Brief summary. Position and Education RECORD OF EMPLOYMENT Michele Tartara Name Michele Tartara Date of birth February, 24th 1984 Citizenship Italian Address Via Oberdan 22, Abbiategrasso (MI) Email michele.tartara@gmail.com Italian Phone +39-3409202134 LinkedIn

More information

AES Power Attack Based on Induced Cache Miss and Countermeasure

AES Power Attack Based on Induced Cache Miss and Countermeasure AES Power Attack Based on Induced Cache Miss and Countermeasure Guido Bertoni, Vittorio Zaccaria STMicroelectronics, Advanced System Technology Agrate Brianza - Milano, Italy, {guido.bertoni, vittorio.zaccaria}@st.com

More information

Francesco Merlo Curriculum Vitæ

Francesco Merlo Curriculum Vitæ Francesco Merlo Curriculum Vitæ CONTACT Address: Phone: Fax: E-mail: Politecnico di Milano Department of Electronics and Information Via Ponzio 34/5 I-20133 Milano (Italy) +39 02 2399 3474 +39 02 2399

More information

CURRICULUM VITAE ET STUDIORUM Eugenio Capra

CURRICULUM VITAE ET STUDIORUM Eugenio Capra CURRICULUM VITAE ET STUDIORUM Eugenio Capra (last updated in August 2008) contact appointment May 2008 - Politecnico di Milano Dipartimento di Elettronica e Informazione Via Ponzio 34/5, 20133 Milano,

More information

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New

More information

Curriculum Vitae et Studiorum Dossier n. 48773. Cinzia Di Giusto

Curriculum Vitae et Studiorum Dossier n. 48773. Cinzia Di Giusto Curriculum Vitae et Studiorum Dossier n. 48773 Cinzia Di Giusto December 31, 2010 Personal Information: Date of birth: Nationality: Di Giusto, Cinzia Oct 17, 1979 in Udine, Italy Italian Home address:

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

Efficient Software Implementation of AES on 32-bit Platforms

Efficient Software Implementation of AES on 32-bit Platforms Efficient Software Implementation of AES on 32-bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano - Italy Pasqualina Lilli Lilli Fragneto AST-LAB of ST Microelectronics, Agrate

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: ckyrkou@gmail.com Education

More information

How To Understand The Theory Of Network Routing In A Computer Program

How To Understand The Theory Of Network Routing In A Computer Program Curriculum Vitae Dr. Enrico Bartolini Department of Science and Methods for Engineering (DISMI) University of Modena and Reggio Emilia Via Amendola 2, Pad. Morselli, 42122, Reggio Emilia, Italy Email:

More information

Cryptography & Network-Security: Implementations in Hardware

Cryptography & Network-Security: Implementations in Hardware Kris Gaj joined ECE GMU in Fall 1998 Cryptography & Network-Security: Implementations in Hardware http://ece.gmu.edu/crypto-text.htm 6 Ph.D. Students Pawel Chodowiec Charikleia Zouridaki Chang Shu Sashisu

More information

IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655

IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2

More information

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Design and Implementation of Asymmetric Cryptography Using AES Algorithm Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

CURRICULUM VITÆ RICARDO CHAVES. December - 2008

CURRICULUM VITÆ RICARDO CHAVES. December - 2008 CURRICULUM VITÆ RICARDO CHAVES December - 2008 PERSONAL DETAILS Full Name: Ricardo Jorge Fernandes Chaves Date of Birth: December 25 th, 1977 Nationality: Portuguese RESEARCH AND TEACHIN G INTERESTS -

More information

CRYPTOG NETWORK SECURITY

CRYPTOG NETWORK SECURITY CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;

More information

Automatized Fault Attack Emulation for Penetration Testing

Automatized Fault Attack Emulation for Penetration Testing Automatized Fault Attack Emulation for Penetration Testing Johannes Grinschgl 1, Thomas Aichinger 3, Armin Krieg 1, Christian Steger 1, Reinhold Weiss 1, Holger Bock 2, Josef Haid 2 1, Graz University

More information

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst. Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.edu Overview Cryptanalysis Challenge Encryption: DES AES Message

More information

Curriculum Vitae. Education. Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, 5 56127 Pisa (Cosenza)

Curriculum Vitae. Education. Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, 5 56127 Pisa (Cosenza) Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, 5 56127 Pisa (Cosenza) paladino@mail.dm.unipi.it Curriculum Vitae Born in Cosenza on August 13, 1980 Education Dec 2008

More information

Curriculum Vitae et Studiorum

Curriculum Vitae et Studiorum Curriculum Vitae et Studiorum Alberto Quattrini Li March 21, 2015 Contents Personal Data 1 Position and Education 1 Education................................................ 1 Academic Positions and Affiliations..................................

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage

More information

DESIGN OF AN ERROR DETECTION AND DATA RECOVERY ARCHITECTURE FOR MOTION ESTIMATION TESTING APPLICATIONS

DESIGN OF AN ERROR DETECTION AND DATA RECOVERY ARCHITECTURE FOR MOTION ESTIMATION TESTING APPLICATIONS DESIGN OF AN ERROR DETECTION AND DATA RECOVERY ARCHITECTURE FOR MOTION ESTIMATION TESTING APPLICATIONS V. SWARNA LATHA 1 & K. SRINIVASA RAO 2 1 VLSI System Design A.I.T.S, Rajampet Kadapa (Dt), A.P., India

More information

A Framework for Security on NoC Technologies

A Framework for Security on NoC Technologies A Framework for Security on NoC Technologies Catherine H. Gebotys, Robert J.Gebotys* Elec.&Comp. Engineering,University of Waterloo, Psych, Wilfrid Laurier University* cgebotys@optimal.vlsi.uwaterloo.ca

More information

Italian. Strada di Montevaccino, 34, 38121, Trento, Italy. chiara.marcolla@gmail.com, chiara.marcolla@unito.it.

Italian. Strada di Montevaccino, 34, 38121, Trento, Italy. chiara.marcolla@gmail.com, chiara.marcolla@unito.it. Chiara Marcolla Università di Torino Dipartimento di Matematica Giuseppe Peano Via Carlo Alberto 8, 10123 Torino, Italy (+39) 348 7639117 chiara.marcolla@unito.it Contact information Citizenship Address

More information

Curriculum Vitae Antonino Zanette. Education. Employement. Activity Research

Curriculum Vitae Antonino Zanette. Education. Employement. Activity Research Curriculum Vitae Antonino Zanette Dipartimento di Scienze Economiche e Statistiche. University of Udine. via Tomadini 30/A 33100 Udine. Email:antonino.zanette@uniud.it Education 1991 Laurea in Scienze

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Information Security Course Specifications2011-2012

Information Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program

More information

Curriculum Vitae Michael M. Zavlanos

Curriculum Vitae Michael M. Zavlanos Curriculum Vitae Michael M. Zavlanos Home Address Work Address 2114 Pine Street 3330 Walnut Street Apartment 1 Front GRASP Laboratory, Levine Hall 465 Philadelphia, PA 19103 Dept. of Electrical and Systems

More information

ECC is Ready for RFID A Proof in Silicon

ECC is Ready for RFID A Proof in Silicon ECC is Ready for RFID A Proof in Silicon RFIDsec 08 Presentation Daniel Hein, daniel.hein@gmx.at Johannes Wolkerstorfer, Johannes.Wolkerstorfer@iaik.tugraz.at Norbert Felber, felber@iis.ee.ethz.ch 1 Outline

More information

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation An Instruction Set Extension for Fast and Memory-Efficient AES Implementation Stefan Tillich, Johann Großschädl, and Alexander Szekely Graz University of Technology Institute for Applied Information Processing

More information

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Hardware Implementation of AES Encryption and Decryption System Based on FPGA Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based

More information

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Computer and Network Security PG 6697. Unit Outline 2007. School of Information Sciences and Engineering

Computer and Network Security PG 6697. Unit Outline 2007. School of Information Sciences and Engineering Computer and Network Security PG 6697 Unit Outline 2007 School of Information Sciences and Engineering Division of Business, Law and Information Sciences University of Canberra Australian Government Higher

More information

Error Detection and Data Recovery Architecture for Systolic Motion Estimators

Error Detection and Data Recovery Architecture for Systolic Motion Estimators Error Detection and Data Recovery Architecture for Systolic Motion Estimators L. Arun Kumar #1, L. Sheela *2 # PG Scholar, * Assistant Professor, Embedded System Technologies, Regional Center of Anna University

More information

Implementation of emulated digital CNN-UM architecture on programmable logic devices and its applications

Implementation of emulated digital CNN-UM architecture on programmable logic devices and its applications Implementation of emulated digital CNN-UM architecture on programmable logic devices and its applications Theses of the Ph.D. dissertation Zoltán Nagy Scientific adviser: Dr. Péter Szolgay Doctoral School

More information

Curriculum Vitae. Grid Thoma

Curriculum Vitae. Grid Thoma Curriculum Vitae Grid Thoma PERSONAL INFORMATION Date of birth: October 3 th 1977 Place of birth: Tirana, Albania Citizenship: Albanian, Italian Not married Permanent Address: Modena, Italy E-mail: grid05(at)gmail.com

More information

Cryptography & Digital Signatures

Cryptography & Digital Signatures Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.

More information

FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION Abstract In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be

More information

Multi-Layered Cryptographic Processor for Network Security

Multi-Layered Cryptographic Processor for Network Security International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,

More information

How To Understand The Behaviour Of A Fault Monitor

How To Understand The Behaviour Of A Fault Monitor Curriculum Vitæ of Dr. Eng. Agostino Marcello Mangini Personal Data First name: Agostino Marcello Family name: Mangini Address: Via Conversano n. 30-70017 Putignano (BA) Phone: +39 080 5963312 Fax: +39

More information

Pertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems

Pertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems Pertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems Stanford University CS259c/MATH250: Elliptic Curves in Cryptography December 15, 2011 1 Introduction Elliptic curve cryptosystems

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003) Curriculum Vitae EDUCATION Monica N. Nicolescu Assistant Professor Department of Computer Science University of Nevada, Reno monica@cs.unr.edu http://www.cs.unr.edu/ monica June 1998 - May 2003: University

More information

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics. Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 vzikas@cs.ucla.edu www.cs.ucla.edu/~vzikas Education 2006

More information

9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin

9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin Fu Lin Contact information Education Work experience Research interests Mathematics and Computer Science Division Phone: (630) 252-0973 Argonne National Laboratory E-mail: fulin@mcs.anl.gov 9700 South

More information

Sofia Ceppi. Personal Information 2. Association Memberships 2. Education 2. Academic Positions and Affiliations 3

Sofia Ceppi. Personal Information 2. Association Memberships 2. Education 2. Academic Positions and Affiliations 3 CURRICULUM VITAE ET STUDIORUM Sofia Ceppi INDICE Personal Information 2 Association Memberships 2 Education 2 Academic Positions and Affiliations 3 Teaching Activities 3 Teaching Assistantships.........................................

More information

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,

More information

Network Security Essentials:

Network Security Essentials: Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

Curriculum Vitae. Federico Botta

Curriculum Vitae. Federico Botta Curriculum Vitae Federico Botta Personal Data Name: Botta, Federico Date of Birth: November 15, 1987 Place of Birth: Como, Italy Nationality: Italian Current Address Centre for Complexity Science Zeeman

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Wireless Mobile Internet Security. 2nd Edition

Wireless Mobile Internet Security. 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown

More information

The Encryption Technology of Automatic Teller Machine Networks

The Encryption Technology of Automatic Teller Machine Networks Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller

More information

Cryptography and Network Security Chapter 10

Cryptography and Network Security Chapter 10 Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central

More information

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

Lightweight Cryptography From an Engineers Perspective

Lightweight Cryptography From an Engineers Perspective Lightweight Cryptography From an Engineers Perspective ECC 2007 Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2 Outline Motivation Hardware

More information

FPGA IMPLEMENTATION OF AES ALGORITHM

FPGA IMPLEMENTATION OF AES ALGORITHM FPGA IMPLEMENTATION OF AES ALGORITHM S.A. Annadate 1, Nitin Ram Chavan 2 1,2 Electronics and Telecommunication Dept, J N Collage of engineering Aurangabad, (India) ABSTRACT Advanced Encryption Standard

More information

Yier Jin RESEARCH INTERESTS

Yier Jin RESEARCH INTERESTS Yier Jin Department of Electrical Engineering and Computer Science University of Central Florida, Orlando, FL 32816 Phone: (407) 823-5321 (Office), (203) 859-1202 (Mobile) Fax: (407) 823-5483 Email: yier.jin@ucf.edu

More information

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

A New Efficient Digital Signature Scheme Algorithm based on Block cipher IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1

More information

A New Security Protocol Using Hybrid Cryptography Algorithms

A New Security Protocol Using Hybrid Cryptography Algorithms International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Special Issue-2, April 2016 E-ISSN: 2347-2693 A New Security Protocol Using Hybrid Cryptography Algorithms

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES

More information

An Overview of Common Adversary Models

An Overview of Common Adversary Models An Overview of Common Adversary Karl Palmskog palmskog@kth.se 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

ANDREA COLOMBARI. Curriculum vitae

ANDREA COLOMBARI. Curriculum vitae ANDREA COLOMBARI Curriculum vitae PERSONAL DATA Birthplace: Verona Birthday: March, the 18 th, 1976 Marital status: unmarried Nationality: Italian Home address: Viale Spolverini, 112 37131 Verona, Italy

More information

The Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow

More information

Academic Year 2014/15. School of Industrial and Information Engineering. Degree Programme of:

Academic Year 2014/15. School of Industrial and Information Engineering. Degree Programme of: Academic Year 2014/15 School of Industrial and Information Engineering Degree Programme of: Telecommunication Engineering Laurea Magistrale (Equivalent To Master Of Science) Milano Leonardo Campus 1. General

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

COURSE PROFILE. This course aims to give IT people the awareness for security needs of information in organizations, tools to enhance security.

COURSE PROFILE. This course aims to give IT people the awareness for security needs of information in organizations, tools to enhance security. COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Information Security IT07 Fall + 0 + 0 7 Prerequisites None Course Language Course Type Course Lecturer Course

More information

Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing 322 The International Arab Journal of Information Technology, Vol. 11, No. 4, July 2014 Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

More information

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography Anca Nitulescu PhD Student Personal information Address: Ecole Normale Supérieure, DI Paris, France Email: anca.nitulescu@ens.fr Occupational field Cryptography: Provable Security for Protocols I have

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

MsC in Advanced Electronics Systems Engineering

MsC in Advanced Electronics Systems Engineering MsC in Advanced Electronics Systems Engineering 1 2 General overview Location: Dijon, University of Burgundy, France Tuition Fees : 475 / year Course Language: English Course duration: 1 year Level: Second

More information

PhD Program in Cancer and Immunology

PhD Program in Cancer and Immunology Application Form 2010 APPLICATION DEADLINE: MAY 1ST, 2010 Please print clearly or type APPLICATION (Please, fill in with the name of the thesis director you have chosen from the list provided on our website:

More information

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms. A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,

More information

Lectures for the course: Electronic Commerce Technology (IT 60104)

Lectures for the course: Electronic Commerce Technology (IT 60104) Lectures for the course: Electronic Commerce Technology (IT 60104) Week 1 Lecture 1 30/12/2010 Introduction to the course Evaluation guidelines Week 2 Lecture 2 3/01/2011 Overview of E-Commerce E-Commerce

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

Reasons for need for Computer Engineering program From Computer Engineering Program proposal

Reasons for need for Computer Engineering program From Computer Engineering Program proposal Reasons for need for Computer Engineering program From Computer Engineering Program proposal Department of Computer Science School of Electrical Engineering & Computer Science circa 1988 Dedicated to David

More information

PUBBLICAZIONI SCIENTIFICHE DEL DOTT. FAUSTO FASANO

PUBBLICAZIONI SCIENTIFICHE DEL DOTT. FAUSTO FASANO PUBBLICAZIONI SCIENTIFICHE DEL DOTT. FAUSTO FASANO Pubblicazioni Scientifiche del dott. Fausto Fasano 2 Dissertazioni T1 F. Fasano, Fine-grained management of Software Artefacts, Tesi di Dottorato di Ricerca

More information

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014

Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014 Verfahren zur Absicherung von Apps Dr. Ullrich Martini IHK, 4-12-2014 Agenda Introducing G&D Problem Statement Available Security Technologies Smartcard Embedded Secure Element Virtualization Trusted Execution

More information

TELECOMMUNICATION NETWORKS

TELECOMMUNICATION NETWORKS THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS

More information

Triathlon of Lightweight Block Ciphers for the Internet of Things

Triathlon of Lightweight Block Ciphers for the Internet of Things NIST Lightweight Cryptography Workshop 2015 Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Leo Perrin, Johann Großschädl, Alex Biryukov

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Advanced Cryptography

Advanced Cryptography Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128 SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication

More information

3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis. 4. Algorithms for linear algebra problems over principal ideal rings

3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis. 4. Algorithms for linear algebra problems over principal ideal rings 1. Faktorisierung großer Zahlen 2. On smooth ideals in number fields 3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis 4. Algorithms for linear algebra problems over principal

More information