Browsing University of Waterloo by Supervisor "Aagaard, Mark"
Now showing items 1-7 of 7
-
Abstraction and Refinement Techniques for Ternary Symbolic Simulation with Guard-value Encoding
(University of Waterloo, 2022-05-20)We propose a novel encoding called guard-value encoding for the ternary domain {0, 1, X}. Among the advantages it has over the more conventional dual-rail encoding, the flexibility of representing X with either of <0, 0> ... -
Area and Energy Optimizations in ASIC Implementations of AES and PRESENT Block Ciphers
(University of Waterloo, 2020-05-25)When small, modern-day devices surface with neoteric features and promise benefits like streamlined business processes, cashierless stores, and autonomous driving, they are all too often accompanied by security risks due ... -
Automated Design Space Exploration and Datapath Synthesis for Finite Field Arithmetic with Applications to Lightweight Cryptography
(University of Waterloo, 2020-05-27)Today, emerging technologies are reaching astronomical proportions. For example, the Internet of Things has numerous applications and consists of countless different devices using different technologies with different ... -
A Flexible Ultralight Hardware Security Module for EPC RFID Tags
(University of Waterloo, 2021-10-01)Due to the rapid growth of using Internet of Things (IoT) devices in daily life, the need to achieve an acceptable level of security and privacy for these devices is rising. Security risks may include privacy threats like ... -
Hardware Implementations of the Lightweight Welch-Gong Stream Cipher Family using Polynomial Bases
(University of Waterloo, 2019-01-28)In this thesis we develop a parametrized generic hardware implementation for the Welch-Gong (WG) stream cipher family for low power and low cost applications. WG stream ciphers operate over finite fields, and are comprised ... -
Optimizations and Hardware Implementations for Composited de Bruijn Sequence Generators
(University of Waterloo, 2016-01-21)A binary de Bruijn sequence with period 2^n is a sequence in which every length-n sub-sequence occurs exactly once. de Bruijn sequences have randomness properties that make them attractive for pseudorandom number generators. ... -
Optimized Hardware Implementations of Lightweight Cryptography
(University of Waterloo, 2017-01-20)Radio frequency identification (RFID) is a key technology for the Internet of Things era. One important advantage of RFID over barcodes is that line-of-sight is not required between readers and tags. Therefore, it is widely ...