Perfil del autor: Tena Sánchez, Erica
Datos institucionales
Nombre | Tena Sánchez, Erica |
Departamento | Tecnología Electrónica |
Área de conocimiento | Tecnología Electrónica |
Categoría profesional | Profesor Permanente Laboral - Mod. PCD |
Correo electrónico | Solicitar |
Estadísticas
-
Nº publicaciones
35
-
Nº visitas
3767
-
Nº descargas
5465
Publicaciones |
---|
Trabajo Fin de Grado
Creación de juegos en SoC FPGA utilizando una matriz de led RGB
(2024)
En desarrollos de sistemas complejos con altas prestaciones las opciones a las que se suele recurrir suelen pasar por las ... |
Artículo
Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs
(MDPI, 2024)
The majority of data exchanged between connected devices are confidential and must be protected against unauthorized access. ... |
Ponencia
Review of: Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
In this paper, we present a review of the work [1]. Some of the most powerful hardware attacks are called fault injection ... |
Ponencia
A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks
(Institute of Electrical and Electronics Engineers, 2023)
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. ... |
Ponencia
A Simple Power Analysis of an FPGA implementation of a polynomial multiplier for the NTRU cryptosystem
(Institute of Electrical and Electronics Engineers, 2023)
As quantum computing technology advances, the security of traditional cryptographic systems is becoming increasingly ... |
Ponencia
Experimental cartography generation methodology for Electromagnetic Fault Injection Attacks [póster]
(IEEE, 2023)
The Electromagnetic Fault Injection (EMFI) is one of the methods to inject faults in the circuits with different purposes, ... |
Capítulo de Libro
Uso de casos prácticos reales como dinamizadores de pensamiento crítico en asignaturas de electrónica
(Editorial Universidad de Sevilla, 2023)
En este capítulo se presenta el planteamiento, desarrollo y resultados de un ciclo de mejora en el aula (CIMA) aplicado ... |
Artículo
Design and evaluation of countermeasures against fault injection attacks and power side-channel leakage exploration for AES block cipher
(IEEE, 2022)
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the ... |
Artículo
Hardware Countermeasures Benchmarking Against Fault Attacks
(MDPI, 2022)
The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits ... |
Artículo
Gate-Level Hardware Countermeasure Comparison against Power Analysis Attacks
(MDPI, 2022)
The fast settlement of privacy and secure operations in the Internet of Things (IoT) is appealing in the selection of ... |
Capítulo de Libro
Design and security evaluation of secure cryptoharware (FPGA and ASIC) against hackers exploiting side-channel information
(3ciencias, 2022)
Tradicionalmente, la seguridad en los dispositivos criptográficos estaba ligada exclusivamente a la fortaleza del algoritmo. ... |
Capítulo de Libro
Metodología de diseño para la detección de fallos en cifradores de bloques basada en códigos de Hamming
(3ciencias, 2022)
La inserción de fallos y en concreto los análisis diferenciales de fallos (Differential Fault Analysis – DFA) se han ... |
Trabajo Fin de Grado
Desarrollo de setup experimental y control automático de instrumentos para optimizar ataques de canal lateral
(2022)
Un ataque de canal lateral explota un observable físico proveniente de un dispositivo criptográfico con el fin de extraer ... |
Ponencia
Automated experimental setup for EM cartography to enhance EM attacks
(2022)
Side-channel attacks are a real threat, exploiting and revealing the secret data stored in our electronic devices ... |
Capítulo de Libro
Puesta en común y fomento de la exposición de aplicaciones reales en los laboratorios de electrónica
(Universidad de Sevilla, 2022)
El ciclo de mejora en el aula presentado en este capítulo se ha desarrollado en la asignatura de Acondicionamiento y ... |
Capítulo de Libro
Review of Gate-Level Hardware Countermeasure Comparison Against Power Analysis Attacks
(Fundación Tecnalia Research and Innovation, 2022)
In this paper, we present a review of the work [1]. The fast settlement of Privacy and Secure operations in the Internet ... |
Capítulo de Libro
Review of Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacksand DFA
(Fundación Tecnalia Research and Innovation, 2022)
In this paper, we present a review of the work [1]. In this work a complete setup to break ASIC implementations of standard ... |
Artículo
Trivium Stream Cipher Countermeasures Against Fault Injection Attacks and DFA
(Institute of Electrical and Electronics Engineers. IEEE, 2021)
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to include more and more countermeasures ... |
Artículo
Experimental FIA Methodology Using Clock and Control Signal Modifications under Power Supply and Temperature Variations
(MDPI, 2021)
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. ... |
Artículo
Gate-Level Design Methodology for Side-Channel Resistant Logic Styles Using TFETs
(IEEE, 2021)
The design of secure circuits in emerging technologies is an appealing area that requires new efforts and attention as an ... |
Trabajo Fin de Máster
Establecimiento y medida de figuras de seguridad criptográfica en función de la potencia
(2021)
Los ataques de canal lateral se utlizan para revelar datos secretos de dispositvos criptográfcos mediante la extracción ... |
Trabajo Fin de Máster |
Ponencia
Hamming-code based fault detection design methodology for block ciphers
(IEEE Computer Society, 2020)
Fault injection, in particular Differential Fault Analysis (DFA), has become one of the main methods for exploiting ... |
Artículo
Projection of Dual-Rail DPA Countermeasures in Future FinFET and Emerging TFET Technologies
(Association for Computing Machinery (ACM), 2020)
The design of near future cryptocircuits will require greater performance characteristics in order to be implemented in ... |
Tesis Doctoral
Diseño y caracterización de criptocircuitos seguros y resistentes a ataques físicos.
(2019)
A diario personas de todo el mundo hacen uso de dispositivos electrónicos en los que almacenan o con los que intercambian ... |
Trabajo Fin de Grado |
Artículo
Power and energy issues on lightweight cryptography
(American Scientific Publishers, 2017)
Portable devices such as smartphones, smart cards and other embedded devices require encryption technology to guarantee ... |
Artículo
Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview
(Wiley-Blackwell, 2017)
We provide an overview of selected crypto-hardware devices, with a special reference to the lightweight electronic ... |
Trabajo Fin de Grado |
Trabajo Fin de Grado
Procesado de señales eléctricas para la optimización de ataques laterales en circuitos criptográficos
(2016)
Existen diversas formas de romper la seguridad de un sistema criptográfico. Una de ellas son los ataques de canal lateral ... |
Ponencia
Diseño de circuitos integrados y seguridad de circuitos criptográficos frente a ataques
(Área de Innovación y Desarrollo, 2016)
Muchos sistemas electrónicos incorporan dispositivos criptográficos que implementan algoritmos que cifran la información ... |
Ponencia
Low-power differential logic gates for dpa resistant circuits
(Institute of Electrical and Electronics Engineers, 2014)
Information leakaged by cryptosistems can be used by third parties to reveal critical information using Side Channel Attacks ... |
Artículo
A Programmable and Configurable ASIC to Generate Piecewise-Affine Functions Defined Over General Partitions
(IEEE Computer Society, 2013)
This paper presents a programmable and configurable architecture and its inclusion in an Application Specific Integrated ... |
Ponencia
Reducing bit flipping problems in SRAM physical unclonable functions for chip identification
(Institute of Electrical and Electronics Engineers, 2012)
Physical Unclonable functions (PUFs) have appeared as a promising solution to provide security in hardware. SRAM PUFs offer ... |
Ponencia
ASIC-in-the-loop methodology for verification of piecewise affine controllers
(Institute of Electrical and Electronics Engineers, 2012)
This paper exposes a hardware-in-the-loop metho- dology to verify the performance of a programmable and confi- gurable ... |