Daniel Mesquita
University of Montpellier
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Daniel Mesquita.
international parallel and distributed processing symposium | 2003
Daniel Mesquita; Fernando Gehm Moraes; José Carlos S. Palma; Leandro Möller; Ney Laert Vilar Calazans
This work describes the implementation of digital reconfigurable systems (DRS) using commercial FPGA devices. This paper has three main goals. The first one is to present the trend of DRS, highlighting the problems and solutions of each DRS generation. The second goal is to present in detail the configuration architecture of a commercial FPGA family allowing DRS implementation. The last goal is to present a set of tools for remote and partial reconfiguration developed for this FPGA family. Even though the tools are targeted to a specific device, their building principles may easily be adapted to other FPGA families, if they have an internal architecture enabling partial reconfiguration. The main contribution of the paper is the tool-set proposed to manipulate cores using partial reconfiguration in existing FPGA.
symposium on integrated circuits and systems design | 2005
Daniel Mesquita; Jean-Denis Techer; Lionel Torres; Gilles Sassatelli; Gaston Cambon; Michel Robert; Fernando Gehm Moraes
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or electromagnetic emanation. The differential power analysis (DPA) is a powerful side channel attack, based only on the power consumption information. There are some countermeasures proposed at algorithmic or architectural level that are expensive and/or complexes. This paper addresses the DPA attack problem by a novel and efficient transistor-level method based on a power consumption control, without any modification on the cryptographic algorithms, messages or keys
international parallel and distributed processing symposium | 2007
Daniel Mesquita; Benoît Badrignans; Lionel Torres; Gilles Sassatelli; Michel Robert; Fernando Gehm Moraes
This work addresses the problem of information leakage of cryptographic devices, by using the reconfiguration technique allied to an RNS based arithmetic. The information leaked by circuits, like power consumption, electromagnetic emissions and time to compute may be used to find cryptographic secrets. The results issue of prototyping shows that our coarse grained reconfigurable architecture is robust against power analysis attacks.
field-programmable logic and applications | 2006
Daniel Mesquita; Benoît Badrignans; Lionel Torres; Gilles Sassattell; Michel Robert; Jean-Claude Bajard; Fernando Gehm Moraes
Hardware implementations of cryptographic algorithms may leak some information that can be used to recover cryptographic keys. This work combines reconfigurable techniques with the recently proposed leak resistant arithmetic (LRA) to thwart some side channel attacks (SCA). The introduced architecture outcomes the performance of classical implementation of modular multiplication, for key size exceeding 2048 bits, with a reasonable extra area overhead. Nevertheless, this is not a drawback, but a cost, since the main issue of the proposed architecture is the improved robustness in terms of security.
design, automation, and test in europe | 2003
Fernando Gehm Moraes; Daniel Mesquita; José Carlos S. Palma; Leandro Möller; Ney Laert Vilar Calazans
This work describes the implementation of digital reconfigurable systems (DRS) using commercial FPGA devices. The main goal is to present a set of tools for remote and partial reconfiguration developed for the Virtex FPGA family. Even though the tools are targeted to a specific device, their building principles may easily be adapted to other FPGA families, if they have an internal architecture enabling partial reconfiguration. The main contribution of the paper is the tool-set proposed to manipulate cores using partial reconfiguration in existing FPGAs.
IEEE Transactions on Very Large Scale Integration Systems | 2007
Daniel Mesquita; Jean-Denis Techer; Lionel Torres; Michel Robert; Guy Cathébras; Gilles Sassatelli; Fernando Gehm Moraes
This work addresses the leakage information problem concerning cryptographic circuits. Physical implementations of cryptographic algorithms may let escape some side channel information, like electromagnetic emanations, temperature, computing time, and power consumption. With this information, an attacker can retrieve the data that is being computed, like cryptographic keys. This paper proposes a novel method to thwart DPA attacks, based on power consumption control. As main contribution, this approach not requires any modification on the cryptographic algorithm, the messages or keys.
international symposium on system-on-chip | 2006
Daniel Mesquita; Benoît Badrignans; Lionel Torres; Gilles Sassatelli; Michel Robert; Fernando Gehm Moraes
This work addresses the problem of hardware attacks against cryptographic circuits. The most dangerous side-channel attack: the differential power analysis (DPA) is discussed, as well the state of art countermeasures. Then new reconfigurable system on chip resistant against DPA attacks is proposed. Results shows that our architecture is efficient against DPA attacks, but also outcomes the performance of classical implementation of modular exponentiation, for key size exceeding 2048 bits, with a reasonable extra area overhead
IEE Proceedings - Communications | 2003
Fernando Gehm Moraes; Ney Laert Vilar Calazans; César A. M. Marcon; Daniel Mesquita; José Carlos S. Palma; V. H. Blauth
Archive | 2002
Leandro Möller; Daniel Mesquita; Fernando Gehm Moraes
REC'07: Actas das III Jornadas Sobre Sistemas Reconfiguràveis | 2007
Daniel Mesquita; Fernando Moraes; Ney Laert Vilar Calazans; Lionel Torres; Michel Robert