Secure Connected Devices
Our research on Secure connected devices, led by Professor Máire O’Neill, focuses on:
- Trusted Hardware: encompasses research on Physical Unclonable Functions (PUF), Side Channel Analysis (SCA), Hardware Trojan detection and Security Verification in EDA tools
- Hardware-based Security Services: comprises research into advanced cryptographic architectures, such as IBE, ABE and privacy-preserving technologies, post-quantum cryptography and the combination of hardware security with advanced cryptographic schemes to provide data-centric security through hardware-based security services, e.g. secure-boot.
- Practical post-quantum cryptography
- Physically secure hardware post-quantum crypto designs
- Physically secure software post-quantum crypto designs
- Parameter selection
- Lattice-based IBE
- IoT Device Authentication - Physical Unclonable Functions (PUFs)
- Identity-based PUF
- Challenge-response based PUF
- Multi-PUF design
- Resistance to Modelling attacks
- Side Channel Analysis (SCA)
- Pre-processing techniques
- Low-cost countermeasures
- Machine learning based SCA
- Cryptographic Hardware & Software Architectures
- AES, RSA, ECC speed- and area-optimised designs
- Homomorphic Encryption hardware architectures
- Quantum-dot Cellular Automata Circuit designs
- Hardware Trojan Detection
- Static detection techniques
- ML-based approaches