Guest Editors’ Introduction to Security in Reconfigurable Systems Design

This special issue on Security in Reconfigurable Systems Design reports on recent research results in the design and implementation of trustworthy reconfigurable systems. Five articles cover topics including power-efficient implementation of public-key cryptography, side-channel analysis of electromagnetic radiation, side-channel resistant design, design of robust unclonable functions on an FPGA, and Trojan detection in an FPGA bitstream.

[1]  FRANÇOIS-XAVIER STANDAERT,et al.  An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays , 2006, Proceedings of the IEEE.

[2]  Jovan Dj. Golic,et al.  High-Speed True Random Number Generation with Logic Gates Only , 2007, CHES.

[3]  Hamad Alrimeih,et al.  Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware , 2007, IEEE Design & Test of Computers.

[4]  Miodrag Potkonjak,et al.  Robust FPGA intellectual property protection through multiple small watermarks , 1999, DAC '99.

[5]  Tarek A. El-Ghazawi,et al.  Implementation of elliptic curve cryptosystems over GF(2n) in optimal normal basis on a reconfigurable computer , 2004, FPGA '04.

[6]  G. Gogniat,et al.  Reconfigurable Security Primitive for Embedded Systems , 2005, 2005 International Symposium on System-on-Chip.

[7]  Christof Paar,et al.  Security on FPGAs: State-of-the-art implementations and attacks , 2004, TECS.

[8]  Berk Sunar,et al.  A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks , 2007, IEEE Transactions on Computers.

[9]  Ahmad-Reza Sadeghi,et al.  Reconfigurable trusted computing in hardware , 2007, STC '07.

[10]  Christof Paar,et al.  COPACOBANA A Cost-Optimized Special-Purpose Hardware for Code-Breaking , 2006, 2006 14th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.

[11]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[12]  Daisuke Suzuki,et al.  How to Maximize the Potential of FPGA Resources for Modular Exponentiation , 2007, CHES.

[13]  Simin Nadjm-Tehrani,et al.  Development of Safety-Critical Reconfigurable Hardware with Esterel , 2003, FMICS.

[14]  Gang Wang,et al.  Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[15]  Steven Trimberger Trusted Design in FPGAs , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[16]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[17]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[18]  Saar Drimer,et al.  Authentication of FPGA Bitstreams: Why and How , 2007, ARC.

[19]  Ingrid Verbauwhede,et al.  Reconfigurable modular arithmetic logic unit supporting high-performance RSA and ECC over GF( p ) , 2007 .