Sorin A. Huss - Technische Universität Darmstadt

Slides:



Advertisements
Similar presentations
14. Aug Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware SAC 2013, Burnaby, Canada Thomas Pöppelmann and Tim Güneysu.
Advertisements

Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
Rejuvenated MiCOM P40 Double the practicality
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Security of Things Kelly Jagers op Akkerhuis
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Advanced Information Security 4 Field Arithmetic
Design Technology Center National Tsing Hua University IC-SOC Design Driver Highlights Cheng-Wen Wu.
1 Computer Engineering Department College of Computer Sciences and Engineering Tuesday 18 November 2008 King Fahd University of Petroleum & Minerals.
Digital Systems Emphasis for Electrical Engineering Students Digital Systems skills are very valuable for electrical engineers Digital systems are the.
Spring 08, Jan 15 ELEC 7770: Advanced VLSI Design (Agrawal) 1 ELEC 7770 Advanced VLSI Design Spring 2007 Introduction Vishwani D. Agrawal James J. Danaher.
Spring 07, Jan 16 ELEC 7770: Advanced VLSI Design (Agrawal) 1 ELEC 7770 Advanced VLSI Design Spring 2007 Introduction Vishwani D. Agrawal James J. Danaher.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
RRB/STS ORNL Workshop Integrated Hardware/Software Security Support R. R. BrooksSam T. Sander Associate ProfessorAssistant Professor Holcombe Department.
EKT303/4 PRINCIPLES OF PRINCIPLES OF COMPUTER ARCHITECTURE (PoCA)
Korea-Japan Joint Workshop at KDDI, Tokyo IT-Security Researches in Germany and Europe Prof. Tsuyoshi Takagi Future University ‐ Hakodate
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Discrete Mathematics. - Coding Theory and Cryptology - Cryptographic Implementations eindhoven.cr.yp.to - Discrete Algebra and Geometry.
Dr. Alireza Ghorshi Dr. Mohammad Mortazavi Dr. Mohammad Khansari Dr. Alireza Nemany Pour.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Dr. Nazar Abbas Saqib.
Follow-up Courses. ECE Department MS in Electrical Engineering MS EE MS in Computer Engineering MS CpE COMMUNICATIONS & NETWORKING SIGNAL PROCESSING CONTROL.
Integrated Circuits and Systems Laboratory Darmstadt University of Technology Design Space Exploration of incompletely specified Embedded Systems.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
FPT 2006 Bangkok A Novel Memory Architecture for Elliptic Curve Cryptography with Parallel Modular Multipliers Ralf Laue, Sorin A. Huss Integrated Circuits.
Gaj1P230/MAPLD 2004 Elliptic Curve Cryptography over GF(2 m ) on a Reconfigurable Computer: Polynomial Basis vs. Optimal Normal Basis Representation Comparative.
ELEC692/04 course_des 1 ELEC 692 Special Topic VLSI Signal Processing Architecture Fall 2004 Chi-ying Tsui Department of Electrical and Electronic Engineering.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
Assoc. Prof. Dr. Ahmet Turan ÖZCERİT.  What is engineer,  What is Computer Engineering  The topics in Computer Engineering You will learn: 2.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Center for Embedded Systems (CECS) Eli Bozorgzadeh Computer Science Department.
Certicom Corporation Open House June 3, Certicom Corp. Founded in 1985 by Dr. Scott Vanstone Innovators in security technology –Leading supplier.
Lecture5 – Introduction to Cryptography 3/ Implementation Rice ELEC 528/ COMP 538 Farinaz Koushanfar Spring 2009.
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2 n ) Michael Jung 1, M. Ernst 1, F. Madlener 1, S. Huss 1, R. Blümel.
Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science/
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
Data Communications I & Computer Security I Faculty currently includes: G. Chen, Costello, Elbirt, Liu, D. Martin, Wang.
Co-PIs: Dr. I-En Liao, CSE Department, National Chung Hsing University Dr. Gwoboa Horng, CSE Department, National Chung Hsing University Dr. Chung-Ming.
KU Leuven - COSIC Info Session ERC Advanced Grants- 1June 2016 ERC – ADG Cathedral: Post-Snowden Circuits and Design Methods for Security Ingrid.
1 Electronics Department A Brief Overview Presented By: Dr. Amr T. Abdel-Hamid.
SUBJECT : DIGITAL ELECTRONICS CLASS : SEM 3(B) TOPIC : INTRODUCTION OF VHDL.
On the Synthesis of Side-Channel resistant Cryptographic Modules Sorin Alexander Huss Integrated Circuits and Systems Lab Computer Science Department Technische.
Supported in part by NIST/U.S. Department of Commerce
Electrical Engineering
Overview on Hardware Security
Industry 4.0 Future of J ref. R. Anderl, Technische Universität Darmstadt,
Advanced Information Security 6 Side Channel Attacks
ELEC 7770 Advanced VLSI Design Spring 2016 Introduction
Protect Your Hardware from Hacking and Theft
ELEC 7770 Advanced VLSI Design Spring 2014 Introduction
Elliptic Curve Cryptography over GF(2m) on a Reconfigurable Computer:
Survey of Crypto CoProcessor Design
Secure Processing On-Chip
ELEC 7770 Advanced VLSI Design Spring 2012 Introduction
What is TECHNISCHE INFORMATIK / COMPUTER ENGINEERING ?
Performance vs. Processing Power:
ELEC 7770 Advanced VLSI Design Spring 2010 Introduction
Protect Your Hardware from Hacking and Theft
The Application of Elliptic Curves Cryptography in Embedded Systems
Distributed Sensing, Control, and Uncertainty
Integrated Multiphysics Simulations and Design Optimization Industrial Open Day, Jyvaskyla University.
Reconfigurable Computing University of Arkansas
Advanced Digital Systems Design Methodology
An Improved Novel Key Management Protocol for RFID Systems
Maria Méndez Real, Vincent Migliore, Vianney Lapotre, Guy Gogniat
Seminar Tittles 1-Modeling and Optimization of soft-error reliability of Sequential circuits. 2-Statistical Estimation of Sequential Circuit Activities.
Presentation transcript:

Sorin A. Huss - Technische Universität Darmstadt

Sorin Alexander Huss Education, Positions, Assignments Electrical Engineering at Technische Universität München, Germany 1976: Dipl.-Ing. 1982: Dr.-Ing. Positions AEG Aktiengesellschaft Ulm, Germany 1982-1986: CAD Engineer, AEG Integrated Circuits Design Center 1986-1990: Head of CAE Department Technische Universität Darmstadt, Germany 1990-2015: Full Professor, Computer Science Department Head of Integrated Circuits and Systems Lab Assignments and Activities CASED - Center for Advanced Security Research Darmstadt 2009-2011: Director of Secure Things Department Scientific Consultant to Research Agencies and Industries Initiator and Steering Committee Member of COSADE International Workshop Sorin A. Huss - Technische Universität Darmstadt

Design Methodologies for Cyber-Physical Systems Research Areas Design Methodologies for Cyber-Physical Systems Reconfigurable HW/SW Architectures for IT Security Applications Privacy- and Security-preserving Car-to-Car Communication Protocols and Architectures Sorin A. Huss - Technische Universität Darmstadt

HW/SW Architectures for IT Security Some related Publications M. Ernst, M. Jung, F. Madlener, S. Huss, R. Blümel, A reconfigurable System‑on‑Chip Implementation for Elliptic Curve Cryptography over GF(2^n). CHES - Intl. Workshop on Cryptographic Hardware and Embedded Systems, 2002 R. Laue, S. Huss, Parallel Memory Architecture for Elliptic Curve Cryptography over GF(p) aimed at efficient FPGA Implementations. J. of VLSI and Signal Processing Systems, 51, 2008 M. Stöttinger, F. Madlener, S. Huss, Procedures for Securing ECC Implementations against Differential Power Analysis using Reconfigurable Architectures. In: M. Platzner, J. Teich, N. Wehn (eds.), Dynamically Reconfigurable Systems, Springer, 2009 A. Shoufan, S. Huss, High-Performance Rekeying Processor Architecture for Group Key Management. IEEE Trans. on Computers, 5, 2009  A. Shoufan, T. Wink, H. Molter, S. Huss, E. Kohnert, A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem. IEEE Trans. on Computers, 59, 2010 Th. Feller, S. Malipatlolla, D. Meister, S. Huss, TinyTPM: A Lightweight Module aimed to IP Protection and Trusted Embedded Platforms. IEEE Intl. Symp. on Hardware Oriented Security and Trust, 2011 M. Stöttinger, Th. Feller, S. Huss, A Side-Channel hardened IP-Protection Scheme for FPGA-based Platforms . IEEE Intl. Conf. on Field-Programmable Technology , 2011 N. Göttert, Th. Feller, M. Schneider, S. Huss, J. Buchmann, On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes. CHES - Intl. Workshop on Cryptographic Hardware and Embedded Systems, 2012 B. Jungk, M. Stöttinger, J. Gampe, S. Reith, S. Huss, Side-Channel resistant AES Architecture utilizing Randomized Composite Field Representations. IEEE Intl. Conf. on Field-Programmable Technology, 2012 Sorin A. Huss - Technische Universität Darmstadt