We conduct the following research to improve the security of the processor.
Improve performance of cryptographic algorithms.
Improve resistance against physical attacks on the processors, such as power analysis attacks.
We can obtain high performance by implementing cryptographic IPs in hardware. We study hardware designs of the following cryptographic IPs.
TRNG(True Random Number Generators)
Cryptographic Hash functions such as SHA1, SH2, and SHA3.
Symmetric-key cryptography such as AES, SEED, and ARIA.
Lightweight cryptography such as SIMON, SPECK, LEA, and HIGHT.
Public-key cryptography such as RSA and ECC.
Post-quantum cryptography such as Lizard, NTRU, SIDH, and SIKE.
Secret information such as secret keys can be exposed by physical attacks such as de-packaging, fault attacks, and power analysis attacks. We study physical attacks, in particular, power analysis attacks and countermeasures against them.