Author profile: Tena Sánchez, Erica
Institutional data
Name | Tena Sánchez, Erica |
Department | Tecnología Electrónica |
Knowledge area | Tecnología Electrónica |
Professional category | Profesor Permanente Laboral - Mod. PCD |
Request | |
Statistics
-
No. publications
35
-
No. visits
3711
-
No. downloads
5415
Publications |
---|
Final Degree Project
Creación de juegos en SoC FPGA utilizando una matriz de led RGB
(2024)
En desarrollos de sistemas complejos con altas prestaciones las opciones a las que se suele recurrir suelen pasar por las ... |
Article
Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs
(MDPI, 2024)
The majority of data exchanged between connected devices are confidential and must be protected against unauthorized access. ... |
Presentation
Review of: Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs [Póster]
(Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática, 2024)
In this paper, we present a review of the work [1]. Some of the most powerful hardware attacks are called fault injection ... |
Presentation
A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks
(Institute of Electrical and Electronics Engineers, 2023)
As the AES is the standard symmetric cipher selected by NIST, is the best-known and the most widely used block cipher. ... |
Presentation
A Simple Power Analysis of an FPGA implementation of a polynomial multiplier for the NTRU cryptosystem
(Institute of Electrical and Electronics Engineers, 2023)
As quantum computing technology advances, the security of traditional cryptographic systems is becoming increasingly ... |
Presentation
Experimental cartography generation methodology for Electromagnetic Fault Injection Attacks [póster]
(IEEE, 2023)
The Electromagnetic Fault Injection (EMFI) is one of the methods to inject faults in the circuits with different purposes, ... |
Chapter of Book
Uso de casos prácticos reales como dinamizadores de pensamiento crítico en asignaturas de electrónica
(Editorial Universidad de Sevilla, 2023)
En este capítulo se presenta el planteamiento, desarrollo y resultados de un ciclo de mejora en el aula (CIMA) aplicado ... |
Article
Design and evaluation of countermeasures against fault injection attacks and power side-channel leakage exploration for AES block cipher
(IEEE, 2022)
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the ... |
Article
Hardware Countermeasures Benchmarking Against Fault Attacks
(MDPI, 2022)
The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits ... |
Article
Gate-Level Hardware Countermeasure Comparison against Power Analysis Attacks
(MDPI, 2022)
The fast settlement of privacy and secure operations in the Internet of Things (IoT) is appealing in the selection of ... |
Chapter of Book
Design and security evaluation of secure cryptoharware (FPGA and ASIC) against hackers exploiting side-channel information
(3ciencias, 2022)
Tradicionalmente, la seguridad en los dispositivos criptográficos estaba ligada exclusivamente a la fortaleza del algoritmo. ... |
Chapter of Book
Metodología de diseño para la detección de fallos en cifradores de bloques basada en códigos de Hamming
(3ciencias, 2022)
La inserción de fallos y en concreto los análisis diferenciales de fallos (Differential Fault Analysis – DFA) se han ... |
Final Degree Project
Desarrollo de setup experimental y control automático de instrumentos para optimizar ataques de canal lateral
(2022)
Un ataque de canal lateral explota un observable físico proveniente de un dispositivo criptográfico con el fin de extraer ... |
Presentation
Automated experimental setup for EM cartography to enhance EM attacks
(2022)
Side-channel attacks are a real threat, exploiting and revealing the secret data stored in our electronic devices ... |
Chapter of Book
Puesta en común y fomento de la exposición de aplicaciones reales en los laboratorios de electrónica
(Universidad de Sevilla, 2022)
El ciclo de mejora en el aula presentado en este capítulo se ha desarrollado en la asignatura de Acondicionamiento y ... |
Chapter of Book
Review of Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacksand DFA
(Fundación Tecnalia Research and Innovation, 2022)
In this paper, we present a review of the work [1]. In this work a complete setup to break ASIC implementations of standard ... |
Chapter of Book
Review of Gate-Level Hardware Countermeasure Comparison Against Power Analysis Attacks
(Fundación Tecnalia Research and Innovation, 2022)
In this paper, we present a review of the work [1]. The fast settlement of Privacy and Secure operations in the Internet ... |
Article
Trivium Stream Cipher Countermeasures Against Fault Injection Attacks and DFA
(Institute of Electrical and Electronics Engineers. IEEE, 2021)
Attacks on cryptocircuits are becoming increasingly sophisticated, requiring designers to include more and more countermeasures ... |
Article
Experimental FIA Methodology Using Clock and Control Signal Modifications under Power Supply and Temperature Variations
(MDPI, 2021)
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. ... |
Article
Gate-Level Design Methodology for Side-Channel Resistant Logic Styles Using TFETs
(IEEE, 2021)
The design of secure circuits in emerging technologies is an appealing area that requires new efforts and attention as an ... |
Master's Final Project
Establecimiento y medida de figuras de seguridad criptográfica en función de la potencia
(2021)
Los ataques de canal lateral se utlizan para revelar datos secretos de dispositvos criptográfcos mediante la extracción ... |
Master's Final Project |
Presentation
Hamming-code based fault detection design methodology for block ciphers
(IEEE Computer Society, 2020)
Fault injection, in particular Differential Fault Analysis (DFA), has become one of the main methods for exploiting ... |
Article
Projection of Dual-Rail DPA Countermeasures in Future FinFET and Emerging TFET Technologies
(Association for Computing Machinery (ACM), 2020)
The design of near future cryptocircuits will require greater performance characteristics in order to be implemented in ... |
PhD Thesis
Diseño y caracterización de criptocircuitos seguros y resistentes a ataques físicos.
(2019)
A diario personas de todo el mundo hacen uso de dispositivos electrónicos en los que almacenan o con los que intercambian ... |
Final Degree Project |
Article
Power and energy issues on lightweight cryptography
(American Scientific Publishers, 2017)
Portable devices such as smartphones, smart cards and other embedded devices require encryption technology to guarantee ... |
Article
Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview
(Wiley-Blackwell, 2017)
We provide an overview of selected crypto-hardware devices, with a special reference to the lightweight electronic ... |
Final Degree Project |
Final Degree Project
Procesado de señales eléctricas para la optimización de ataques laterales en circuitos criptográficos
(2016)
Existen diversas formas de romper la seguridad de un sistema criptográfico. Una de ellas son los ataques de canal lateral ... |
Presentation
Diseño de circuitos integrados y seguridad de circuitos criptográficos frente a ataques
(Área de Innovación y Desarrollo, 2016)
Muchos sistemas electrónicos incorporan dispositivos criptográficos que implementan algoritmos que cifran la información ... |
Presentation
Low-power differential logic gates for dpa resistant circuits
(Institute of Electrical and Electronics Engineers, 2014)
Information leakaged by cryptosistems can be used by third parties to reveal critical information using Side Channel Attacks ... |
Article
A Programmable and Configurable ASIC to Generate Piecewise-Affine Functions Defined Over General Partitions
(IEEE Computer Society, 2013)
This paper presents a programmable and configurable architecture and its inclusion in an Application Specific Integrated ... |
Presentation
Reducing bit flipping problems in SRAM physical unclonable functions for chip identification
(Institute of Electrical and Electronics Engineers, 2012)
Physical Unclonable functions (PUFs) have appeared as a promising solution to provide security in hardware. SRAM PUFs offer ... |
Presentation
ASIC-in-the-loop methodology for verification of piecewise affine controllers
(Institute of Electrical and Electronics Engineers, 2012)
This paper exposes a hardware-in-the-loop metho- dology to verify the performance of a programmable and confi- gurable ... |