The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customarily employed by malevolent adversaries: observation and differential perturbation attacks, also called SCA and DFA in the abundant scientific literature on this topic. Numerous research efforts have been carried out to defeat respectively...
In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various kind of fault attacks scenarios have been published. However, very few publications available in the public literature detail...
The work presented here is related to Cyclope, an integrated active 3-D vision system. The challenge is to realize an integrated sensor which achieve real-time depth vision with constraints on size, consumption and computational resources. In this paper, we present acquisition method which allows to grab both texture and IR pattern images at least at 25 frames/s. The method uses a pulsed IR laser...
FPGAs are often considered for high-end applications that require embedded cryptography. These devices must thus be protected against physical attacks. However, unlike ASICs, in which custom and backend-level counter-measures can be devised, FPGAs offer less possibilities for a designer to implement counter-measures. We investigate "wave dynamic differential logic'' (WDDL), a logic-level counter-measure...
Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak points of the electronic devices which implement it. These attacks, known as side-channel attacks, have proved to be very powerful in retrieving secret keys from any kind of unprotected electronic device. Amongst the various...
The work presented here is related to Cyclope, an embedded active 3D vision system. The challenge is to realize an integrated sensor which achieve real-time depth vision with constraints on the size, consumption and computational resources. Cyclope is based on active vision and is integrated in a VSiP (visual system in package) allowing multiple technology cohabitation, such as a CMOS imager or an...
Many systems and data processing for 3D vision have been designed but few have targeted real-time embedded systems. We present in this article Cyclope, an original real-time embedded multi-spectral 3D vision sensor. For this, we have developed a new digital processing architecture to reconstruct the 3D information from images. This architecture conforms to embedded system constrains as power dissipation...
Recent advances in vision system integration allows to design new integrated sensors which are able to achieve complexes tasks. The 'Cyclope' project aims to develop a novel integrated sensor for real-time 3D reconstruction. It includes an active vision sensor, a digital centralized processing architecture and a communication block. This sensor is designed to obtain a monolithic integrate vision system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.