CERG Research Areas
The research conducted at CERG can be split into four broad categories as shown below. Click on each link to download the pdf of a short presentation of past and current work of our group in these areas. Warning: the file size of the presentations is rather large.
Recent Publications by Research Area
Hardware Architectures for Cryptography and Cryptanalysis
AES & AES Candidates
- K. Gaj and P. Chodowiec, Fast implementation and fair comparison of the final candidates for Advanced Encryption Standard using Field Programmable Gate Arrays, LNCS 2020, Progress in Cryptology - CT-RSA 2001, Ed. D. Naccache, RSA Conference 2001 - Cryptographers' Track, pages 84-99, Apr., 2001 [pdf] [Bibtex]
- P. Chodowiec, K. Gaj, P. Bellows, and B. Schott, Experimental testing of the Gigabit IPSec-compliant implementations of Rijndael and Triple DES using SLAAC-1V FPGA accelerator board, 4th International Information Security Conference, ISC 2001, Malaga, Spain, LNCS, volume 2200, pages 220234, Oct., 2001 [pdf] [Bibtex]
eSTREAM Candidates
Hash-functions
- T. Grembowski, R. Lien, K. Gaj, N. Nguyen, P. Bellows, J. Flidr, T. Lehman, and B. Schott, Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512, Information Security, 5th International Conference, ISC 2002, Lecture Notes in Computer Science (LNCS), volume 2433, Springer-Verlag, pages 7589, 2002 [pdf] [Bibtex]
Montgomery Multipliers
ECC Cryptosystems
- S. Bajracharya, C. Shu, K. Gaj, and T. El-Ghazawi, Implementation of elliptic curve cryptosystems over GF(2^n) in optimal normal basis on a reconfigurable computer, 14th International Conference on Field Programmable Logic and Applications, FPL 2004, Antwerp, Belgium, pages 1001-1005, Aug, 2004 [pdf] [Bibtex]
Pairing-based Cryptosystems
Hardware Architectures for Cryptanalysis
- K. Gaj, S. Kwon, P. Baier, P. Kohlbrenner, H. Le, M. Khaleeluddin, and R. Bachimanchi, Implementing the elliptic curve method of factoring in reconfigurable hardware, Cryptographic Hardware and Embedded Systems CHES 2006, Lecture Notes in Computer Science (LNCS), volume 4249, Springer , Berlin / Heidelberg, pages 119133, Oct, 2006 [php] [Bibtex]
Side-Channel Attacks and Countermeasures, IP Protection
- I. Verbauwhede, K. Tiri, D. Hwang, and P. Schaumont, Circuits and design techniques for secure ICs resistant to side-channel attacks, IEEE International Conference on Integrated Circuit Design and Technology (ICICDT '06), May, 2006 [Bibtex]
- D. Hwang, K. Tiri, A. Hodjat, B.-C. Lai, S. Yang, P. Schaumont, and I. Verbauwhede, AES-based security coprocessor IC in 0.18-μm CMOS with resistance to differential power analysis side-channel attacks, IEEE Journal of Solid-State Circuits, volume 41, number 4, pages 781792, Apr, 2006 [Bibtex]
- D. Hwang, P. Schaumont, K. Tiri, and I. Verbauwhede, Securing embedded systems, IEEE Security & Privacy Magazine, volume 4, number 2, pages 40-49, Mar, 2006 [Bibtex]
- K. Tiri, D. Hwang, A. Hodjat, B.-C. Lai, S. Yang, P. Schaumont, and I. Verbauwhede, Prototype IC with WDDL and differential routing DPA resistance assessment, Cryptographic Hardware and Embedded Systems CHES 2005, Lecture Notes in Computer Science (LNCS), volume 3659, Springer, pages 354365, 2005 [Bibtex]
- K. Tiri, D. Hwang, A. Hodjat, B. Lai, S. Yang, P. Schaumont, and I. Verbauwhede, A side-channel leakage free coprocessor IC in 0.18μm CMOS for embedded AES-based cryptographic and biometric processing, 42nd Design Automation Conference, pages 222227, 2005 [Bibtex]
Efficient Software Implementation of Cryptologic Algorithms
Comparison of Public Domain Multi-precision Libraries
Pairing-based cryptosystems
Cryptography on Reconfigurable Computers
- S. Bajracharya, C. Shu, K. Gaj, and T. El-Ghazawi, Implementation of elliptic curve cryptosystems over GF(2^n) in optimal normal basis on a reconfigurable computer, 14th International Conference on Field Programmable Logic and Applications, FPL 2004, Antwerp, Belgium, pages 1001-1005, Aug, 2004 [pdf] [Bibtex]
- T. El-Ghazawi, E. El-Araby, M. Huang, K. Gaj, V. Kindratenko, and D. Buell, The promise of high-performance reconfigurable computing, Computer, volume 41, number 2, pages 69-76, Feb, 2008 [Bibtex]
- P. Saha, E. El-Araby, M. Huang, M. Taher, S. Lopez-Buedo, T. El-Ghazawi, C. Shu, K. Gaj, A. Michalski, and D. Buell, Portable library development for reconfigurable computing systems: A case study, Elsevier Parallel Computing: Systems & Applications, volume 34, number 4+5, pages 245260, May, 2008 [Bibtex]
Low-Power Cryptography for RFID and Wireless Sensor Networks
- J.-P. Kaps, Chai-tea, cryptographic hardware implementations of xTEA, Progress in Cryptology INDOCRYPT 2008, Lecture Notes in Computer Science (LNCS), volume 5365, Springer, Heidelberg, pages 363375, Dec, 2008 [extended version, pdf] [Bibtex]
- J.-P. Kaps, G. Gaubatz, and B. Sunar, Cryptography on a speck of dust, Computer, volume 40, number 2, pages 3844, Feb, 2007 [Pre-print, pdf] [Bibtex]
- J.-P. Kaps and B. Sunar, Energy comparison of AES and SHA-1 for ubiquitous computing, Embedded and Ubiquitous Computing (EUC-06) Workshop Proceedings, Lecture Notes in Computer Science (LNCS), volume 4097, Springer, pages 372381, Aug, 2006 [expanded version, pdf] [Bibtex]
- G. Gaubatz, J.-P. Kaps, E. Öztürk, and B. Sunar, State of the art in ultra-low power public key cryptography for wireless sensor networks, Third IEEE International Conference on Pervasive Computing and Communications Workshops, Workshop on Pervasive Computing and Communications SecurityPerSec'05, IEEE Computer Society, pages 146150, Mar, 2005 [pdf] [Bibtex]
- K. Yüksel, J.-P. Kaps, and B. Sunar, Universal hash functions for emerging ultra-low-power networks, Proceeding of The Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS), Society for Modeling and Simulation International (SCS), San Diego, CA, January, 2004 [pdf] [Bibtex]