Reconfigurable Technology and Systems (TRETS)


Search Issue
enter search term and/or author name


ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 2 Issue 1, March 2009

Guest Editors’ Introduction to Security in Reconfigurable Systems Design
Patrick R. Schaumont, Alex K. Jones, Steve Trimberger
Article No.: 1
DOI: 10.1145/1502781.1502782

This special issue on Security in Reconfigurable Systems Design reports on recent research results in the design and implementation of trustworthy reconfigurable systems. Five articles cover topics including power-efficient implementation of...

Elliptic Curve Cryptography on FPGA for Low-Power Applications
Maurice Keller, Andrew Byrne, William P. Marnane
Article No.: 2
DOI: 10.1145/1502781.1502783

Elliptic curve cryptography has generated a lot of research interest due to its ability to provide greater security per bit compared to public key systems such as RSA. The designer of an elliptic curve hardware accelerator is faced with many...

Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs
Robert P. McEvoy, Colin C. Murphy, William P. Marnane, Michael Tunstall
Article No.: 3
DOI: 10.1145/1502781.1502784

Security protocols are frequently accelerated by implementing the underlying cryptographic functions in reconfigurable hardware. However, unprotected hardware implementations are susceptible to side-channel attacks, and Differential Power Analysis...

Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module
Laurent Sauvage, Sylvain Guilley, Yves Mathieu
Article No.: 4
DOI: 10.1145/1502781.1502785

Since the first announcement of a Side Channel Analysis (SCA) about ten years ago, considerable research has been devoted to studying these attacks on Application Specific Integrated Circuits (ASICs), such as smart cards or TPMs. In this article,...

Techniques for Design and Implementation of Secure Reconfigurable PUFs
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potkonjak
Article No.: 5
DOI: 10.1145/1502781.1502786

Physically unclonable functions (PUFs) provide a basis for many security and digital rights management protocols. PUF-based security approaches have numerous comparative strengths with respect to traditional cryptography-based techniques,...

Trust-Based Design and Check of FPGA Circuits Using Two-Level Randomized ECC Structures
Shantanu Dutt, Li Li
Article No.: 6
DOI: 10.1145/1502781.1508209

A novel trust-based design method for FPGA circuits that uses error-correcting code (ECC) structures for detecting design tampers (changes, deletion of existing logic, and addition of extradesign logic-like Trojans) is proposed in this article. We...