Perfil del autor: Acosta Jiménez, Antonio José
Datos institucionales
Nombre | Acosta Jiménez, Antonio José |
Departamento | Electrónica y Electromagnetismo |
Área de conocimiento | Electrónica |
Categoría profesional | Catedrático de Universidad |
Correo electrónico | Solicitar |
Estadísticas
-
Nº publicaciones
64
-
Nº visitas
8140
-
Nº descargas
14216
Publicaciones |
---|
Ponencia
Review of: Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
In this paper, we present a review of the work [1]. Some of the most powerful hardware attacks are called fault injection ... |
Ponencia
A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks
(Institute of Electrical and Electronics Engineers, 2023)
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. ... |
Ponencia
Experimental cartography generation methodology for Electromagnetic Fault Injection Attacks [póster]
(IEEE, 2023)
The Electromagnetic Fault Injection (EMFI) is one of the methods to inject faults in the circuits with different purposes, ... |
Artículo
Design and evaluation of countermeasures against fault injection attacks and power side-channel leakage exploration for AES block cipher
(IEEE, 2022)
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the ... |
Artículo
Hardware Countermeasures Benchmarking Against Fault Attacks
(MDPI, 2022)
The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits ... |
Artículo
Gate-Level Hardware Countermeasure Comparison against Power Analysis Attacks
(MDPI, 2022)
The fast settlement of privacy and secure operations in the Internet of Things (IoT) is appealing in the selection of ... |
Capítulo de Libro
Design and security evaluation of secure cryptoharware (FPGA and ASIC) against hackers exploiting side-channel information
(3ciencias, 2022)
Tradicionalmente, la seguridad en los dispositivos criptográficos estaba ligada exclusivamente a la fortaleza del algoritmo. ... |
Capítulo de Libro
Metodología de diseño para la detección de fallos en cifradores de bloques basada en códigos de Hamming
(3ciencias, 2022)
La inserción de fallos y en concreto los análisis diferenciales de fallos (Differential Fault Analysis – DFA) se han ... |
Trabajo Fin de Grado
Desarrollo de setup experimental y control automático de instrumentos para optimizar ataques de canal lateral
(2022)
Un ataque de canal lateral explota un observable físico proveniente de un dispositivo criptográfico con el fin de extraer ... |
Ponencia
Automated experimental setup for EM cartography to enhance EM attacks
(2022)
Side-channel attacks are a real threat, exploiting and revealing the secret data stored in our electronic devices ... |
Trabajo Fin de Grado
Evaluation of PUF and QKD integration techniques as root of trust in communication systems
(2022)
Quantum Cryptography could be the next key technology in terms of secure communication, but, as with every new technology, ... |
Capítulo de Libro
Review of Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacksand DFA
(Fundación Tecnalia Research and Innovation, 2022)
In this paper, we present a review of the work [1]. In this work a complete setup to break ASIC implementations of standard ... |
Capítulo de Libro
Review of Gate-Level Hardware Countermeasure Comparison Against Power Analysis Attacks
(Fundación Tecnalia Research and Innovation, 2022)
In this paper, we present a review of the work [1]. The fast settlement of Privacy and Secure operations in the Internet ... |
Artículo
Gate-Level Design Methodology for Side-Channel Resistant Logic Styles Using TFETs
(IEEE, 2021)
The design of secure circuits in emerging technologies is an appealing area that requires new efforts and attention as an ... |
Trabajo Fin de Máster
Establecimiento y medida de figuras de seguridad criptográfica en función de la potencia
(2021)
Los ataques de canal lateral se utlizan para revelar datos secretos de dispositvos criptográfcos mediante la extracción ... |
Trabajo Fin de Grado |
Trabajo Fin de Máster |
Ponencia
Hamming-code based fault detection design methodology for block ciphers
(IEEE Computer Society, 2020)
Fault injection, in particular Differential Fault Analysis (DFA), has become one of the main methods for exploiting ... |
Artículo
Projection of Dual-Rail DPA Countermeasures in Future FinFET and Emerging TFET Technologies
(Association for Computing Machinery (ACM), 2020)
The design of near future cryptocircuits will require greater performance characteristics in order to be implemented in ... |
Tesis Doctoral
Diseño y caracterización de criptocircuitos seguros y resistentes a ataques físicos.
(2019)
A diario personas de todo el mundo hacen uso de dispositivos electrónicos en los que almacenan o con los que intercambian ... |
Trabajo Fin de Grado |
Trabajo Fin de Grado |
Artículo
Power and energy issues on lightweight cryptography
(American Scientific Publishers, 2017)
Portable devices such as smartphones, smart cards and other embedded devices require encryption technology to guarantee ... |
Artículo
Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview
(Wiley-Blackwell, 2017)
We provide an overview of selected crypto-hardware devices, with a special reference to the lightweight electronic ... |
Trabajo Fin de Grado |
Trabajo Fin de Grado
Procesado de señales eléctricas para la optimización de ataques laterales en circuitos criptográficos
(2016)
Existen diversas formas de romper la seguridad de un sistema criptográfico. Una de ellas son los ataques de canal lateral ... |
Patente. Invención
Dispositivo para generar funciones multivariables afines a tramos con computación on-line del árbol de búsqueda
(Oficina Española de Patentes y Marcas (OEPM), 2015)
Dispositivo para generar funciones multivariables afines a tramos, en donde se realice la computación on-line del árbol ... |
Ponencia
Low-power differential logic gates for dpa resistant circuits
(Institute of Electrical and Electronics Engineers, 2014)
Information leakaged by cryptosistems can be used by third parties to reveal critical information using Side Channel Attacks ... |
Artículo
A Programmable and Configurable ASIC to Generate Piecewise-Affine Functions Defined Over General Partitions
(IEEE Computer Society, 2013)
This paper presents a programmable and configurable architecture and its inclusion in an Application Specific Integrated ... |
Ponencia
ASIC-in-the-loop methodology for verification of piecewise affine controllers
(Institute of Electrical and Electronics Engineers, 2012)
This paper exposes a hardware-in-the-loop metho- dology to verify the performance of a programmable and confi- gurable ... |
Artículo
An Event-Driven Multi-Kernel Convolution Processor Module for Event-Driven Vision Sensors
(IEEE Computer Society, 2012)
Event-Driven vision sensing is a new way of sensing visual reality in a frame-free manner. This is, the vision sensor (camera) ... |
Artículo
A 32 x 32 Pixel Convolution Processor Chip for Address Event Vision Sensors With 155 ns Event Latency and 20 Meps Throughput
(IEEE Computer Society, 2011)
This paper describes a convolution chip for event-driven vision sensing and processing systems. As opposed to conventional ... |
Tesis Doctoral
Microchips convolucionadores AER para procesado asíncrono neocortical de información sensorial visual codificada en eventos
(2010)
En este trabajo, se presentan dos versiones diferentes de microchips convolucionadores completamente digitales basados en ... |
Ponencia
Using physical unclonable functions for hardware authentication: a survey
(2010)
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security due to their special ... |
Artículo
CAVIAR: A 45k neuron, 5M synapse, 12G connects/s AER hardware sensory-processing-learning-actuating system for high-speed visual object recognition and tracking
(Institute of Electrical and Electronics Engineers, 2009)
This paper describes CAVIAR, a massively parallel hardware implementation of a spike-based sensing-processing-learning-actuating ... |
Artículo
On Real-Time AER 2-D Convolutions Hardware for Neuromorphic Spike-Based Cortical Processing
(IEEE Computer Society, 2008)
In this paper, a chip that performs real-time image convolutions with programmable kernels of arbitrary shape is presented. The ... |
Ponencia
Fully Digital AER Convolution Chip for Vision Processing
(IEEE Computer Society, 2008)
We present a neuromorphic fully digital convolution microchip for Address Event Representation (AER) spike-based processing ... |
Ponencia
La simulación eléctrica en el trabajo académicamente dirigido como vehículo docente para la enseñanza de la electrónica
(2008)
La Electrónica es una disciplina versátil en cuanto a las metodologías y técnicas docentes que pueden emplearse. Frente a ... |
Ponencia
A 2.5MHz bandpass active complex filter With 2.4MHz bandwidth for wireless communications
(2008)
This paper presents a fully differential 8thorder transconductor-based active complex filter with 2.4MHz bandwidth and ... |
Ponencia
Spike Events Processing for Vision Systems
(IEEE Computer Society, 2007)
In this paper we briefly summarize the fundamental properties of spike events processing applied to artificial vision ... |
Ponencia
Asymmetric clock driver for improved power and noise performances
(IEEE Computer Society, 2007)
One of the most important sources of switching noise and power consumption in large VLSI circuits is the clock generation ... |
Artículo
Effects of buffer insertion on the average/peak power ratio in CMOS VLSI digital circuits
(Society of Photo-optical Instrumentation Engineers, 2007)
The buffer insertion has been a mechanism widely used to increase the performances of advanced VLSI digital circuits and ... |
Ponencia
High-speed image processing with AER-based components
(IEEE Computer Society, 2006)
A high speed sample image processing application using AER-based components is presented. The setup objective is to ... |
Artículo
A neuromorphic cortical-layer microchip for spike-based event processing vision systems
(Institute of Electrical and Electronics Engineers, 2006)
We present a neuromorphic cortical-layer processing microchip for address event representation (AER) spike-based processing ... |
Artículo
A mixed-signal integrated circuit for FM-DCSK modulation
(Institute of Electrical and Electronics Engineers, 2005)
This paper presents a mixed-signal application-specific integrated circuit (ASIC) for a frequency-modulated differential ... |
Ponencia
AER Building Blocks for Multi-Layer Multi-Chip Neuromorphic Vision Systems
(Neural Information Processing Systems Foundation, 2005)
A 5-layer neuromorphic vision processor whose components communicate spike events asychronously using the ... |
Ponencia
Selective Clock-Gating for Low Power/Low Noise Synchronous Counters
(Springer, 2002)
The objective of this paper is to explore the applicability of clock gating techniques to binary counters in order to ... |
Ponencia
Gate-Level Simulation of CMOS Circuits Using the IDDM Model
(IEEE Computer Society, 2001)
Timing verification of digital CMOS circuits is a key point in the design process. In this contribution we present the ... |
Ponencia
HALOTIS: high accuracy LOgic TIming simulator with inertial and degradation delay model
(IEEE Computer Society, 2001)
This communication presents HALOTIS, a novel high accuracy logic timing simulation tool, that incorporates a new simulation ... |
Tesis Doctoral
Una aportación al diseño de circuitos integrados CMOS autotemporizados
(2000)
El auge que muestra el campo de los circuitos asíncronos en los últimos años es notorio. Por un lado cada vez se está ... |
Ponencia
Inertial and Degradation Delay Model for CMOS Logic Gates
(IEEE Computer Society, 2000)
The authors present the Inertial and Degradation Delay Model (IDDM) for CMOS digital simulation. The model combines the ... |
Capítulo de Libro
Degradation Delay Model Extension to CMOS Gates
(Springer, 2000)
This contribution extends the Degradation Delay Model (DDM), previously developed for CMOS inverters, to simple logic ... |
Capítulo de Libro
Influence of Clocking Strategies on the Design of Low Switching-Noise Digital and Mixed-Signal VLSI Circuits
(Springer, 2000)
This communication shows the influence of clocking schemes on the digital switching noise generation. It will be shown how ... |
Ponencia
Concepción de un microprocesador: de la especificación a la realización
(Universidad Politécnica de Madrid, 2000)
|
Ponencia
Un entorno informático de ayuda a la docencia de sistemas de comunicación optoelectrónicos
(Universidad Politécnica de Madrid, 2000)
|
Ponencia
Delay degradation effect in submicronic CMOS inverters
(Université Catholique de Louvain, 1997)
This communication presents the evidence of a degradation effect causing important reductions in the delay of a CMOS ... |
Artículo
Analysis of Metastable Operation in a CMOS Dynamic D-Latch
(Springer, 1997)
Nowadays, metastability is becoming a serious problem in high-performance VLSI design, mainly due to the relatively-high ... |
Ponencia
New CMOS VLSI Linear Self-Timed Architectures
(1995)
The implementation of digital signal processor circuits via self-timed techniques is currently a valid altemative to solve ... |
Ponencia
Aplicación del VHDL en prácticas de diseño de sistemas digitales
(Universidad Politécnica de Madrid, 1994)
|
Tesis Doctoral |
Ponencia
Modeling of Real Bistables in VHDL
(IEEE Computer Society, 1993)
A complete VHDL model of bistables including their metastable operation is presented. An RS-NAND latch has been modelled ... |
Ponencia
Arquitectura para el diseño de circuitos autotemporizados bidimensionales. Realización de multiplicadores
(Universidad de Málaga, 1993)
La realización de sistemas digitales mediante técnicas autotemporizadas constituye la mejor alternativa para resolver la ... |
Ponencia
Un nuevo modelo de retraso para puertas lógicas CMOS
(Universidad de Málaga, 1993)
Los modelos de retraso para puertas lógicas, que usan la mayoría de los simuladores lógicos, carecen de la suficiente ... |
Ponencia
Determinación del coeficiente de resolución en biestables RS CMOS
(Universidad Politécnica de Madrid. Laboratorio de Sistemas Integrados, 1992)
El diseño de biestables con riesgo de metaestabilidad requiere que posean coeficientes de resolución adecuados. En este ... |