Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David D. Hwang is active.

Publication


Featured researches published by David D. Hwang.


cryptographic hardware and embedded systems | 2005

Prototype IC with WDDL and differential routing – DPA resistance assessment

Kris Tiri; David D. Hwang; Alireza Hodjat; Bo-Cheng Lai; Shenglin Yang; Patrick Schaumont; Ingrid Verbauwhede

Wave dynamic differential logic combined with differential routing is a working, practical technique to thwart side-channel power attacks. Measurement-based experimental results show that a differential power analysis attack on a prototype IC, fabricated in 0.18μm CMOS, does not disclose the entire secret key of the AES algorithm at 1,500,000 measurement acquisitions. This makes the attack de facto infeasible. The required number of measurements is larger than the lifetime of the secret key in most practical systems.


IEEE Journal of Solid-state Circuits | 2006

AES-Based Security Coprocessor IC in 0.18-

David D. Hwang; Kris Tiri; Alireza Hodjat; Bo-Cheng Lai; Shenglin Yang; Patrick Schaumont; Ingrid Verbauwhede

Security ICs are vulnerable to side-channel attacks (SCAs) that find the secret key by monitoring the power consumption or other information that is leaked by the switching behavior of digital CMOS gates. This paper describes a side-channel attack resistant coprocessor IC fabricated in 0.18-


ieee symposium on security and privacy | 2006

muhbox m

David D. Hwang; Patrick Schaumont; Kris Tiri; Ingrid Verbauwhede

muhbox m


design automation conference | 2005

CMOS With Resistance to Differential Power Analysis Side-Channel Attacks

Kris Tiri; David D. Hwang; Alireza Hodjat; Bo-Cheng Lai; Shenglin Yang; Patrick Schaumont; Ingrid Verbauwhede

CMOS consisting of an Advanced Encryption Standard (AES) based cryptographic engine, a fingerprint-matching engine, template storage, and an interface unit. Two functionally identical coprocessors have been fabricated on the same die. The first coprocessor was implemented using standard cells and regular routing techniques. The second coprocessor was implemented using a logic style called wave dynamic differential logic (WDDL) and a layout technique called differential routing to combat the differential power analysis (DPA) side-channel attack. Measurement-based experimental results show that a DPA attack on the insecure coprocessor requires only 8000 encryptions to disclose the entire 128-bit secret key. The same attack on the secure coprocessor does not disclose the entire secret key even after 1u2009500u2009000 encryptions.


great lakes symposium on vlsi | 2005

Securing embedded systems

Alireza Hodjat; David D. Hwang; Bo-Cheng Lai; Kris Tiri; Ingrid Verbauwhede

A top-down, multiabstraction layer approach for embedded security design reduces the risk of security flaws, letting designers maximize security while limiting area, energy, and computation costs


International Journal of Reconfigurable Computing | 2009

A side-channel leakage free coprocessor IC in 0.18/spl mu/m CMOS for embedded AES-based cryptographic and biometric processing

Bin Zhou; Yingning Peng; David D. Hwang

Security ICs are vulnerable to side-channel attacks (SCAs) that find the secret key by monitoring the power consumption and other information that is leaked by the switching behavior of digital CMOS gates. This paper describes a side-channel attack resistant coprocessor IC and its design techniques. The IC has been fabricated in 0.18/spl mu/m CMOS. The coprocessor, which is used for embedded cryptographic and biometric processing, consists of four components: an advanced encryption standard (AES) based cryptographic engine, a fingerprint-matching oracle, template storage, and an interface unit. Two functionally identical coprocessors have been fabricated on the same die. The first, secure, coprocessor is implemented using a logic style called wave dynamic digital logic (WDDL) and a layout technique called differential routing. The second, insecure, coprocessor is implemented using regular standard cells and regular routing techniques. Measurement-based experimental results show that a differential power analysis (DPA) attack on the insecure coprocessor requires only 8,000 acquisitions to disclose the entire 128b secret key. The same attack on the secure coprocessor still does not disclose the entire secret key at 1,500,000 acquisitions. This improvement in DPA resistance of at least 2 orders of magnitude makes the attack de facto infeasible. The required number of measurements is larger than the lifetime of the secret key in most practical systems.


ad hoc networks | 2004

A 3.84 gbits/s AES crypto coprocessor with modes of operation in a 0.18-μm CMOS technology

David D. Hwang; Bo-Cheng Charles Lai; Ingrid Verbauwhede

In this paper an AES crypto coprocessor that is fabricated using a 0.18-μm CMOS technology is presented. This crypto coprocessor performs the AES-128 encryption in both feedback and non-feedback modes of operation. A maximum throughput of 3.84 Gbits/s is achieved at a 330 MHz clock frequency for ECB, OFB, and CBC modes of operation. This crypto coprocessor can be programmed using the memory-mapped interface of an embedded CPU core and is tested using a LEON 32-bit (SPARC V8) processor in the ThumbPod secure system-on-chip.


IEEE Transactions on Consumer Electronics | 2004

Pipeline FFT architectures optimized for FPGAs

David D. Hwang; Ingrid Verbauwhede

This paper presents optimized implementations of two different pipeline FFT processors on Xilinx Spartan-3 and Virtex-4 FPGAs. Different optimization techniques and rounding schemes were explored. The implementation results achieved better performance with lower resource usage than prior art. The 16-bit 1024-point FFT with the R22SDF architecture had a maximum clock frequency of 95.2 MHz and used 2802 slices on the Spartan-3, a throughput per area ratio of 0.034 Msamples/s/slice. The R4SDC architecture ran at 123.8 MHz and used 4409 slices on the Spartan-3, a throughput per area ratio of 0.028 Msamples/s/slice. On Virtex-4, the 16-bit 1024-point R22SDF architecture ran at 235.6 MHz and used 2256 slice, giving a 0.104 Msamples/s/slice ratio; the 16-bit 1024-point R4SDC architecture ran at 219.2 MHz and used 3064 slices, giving a 0.072 Msamples/s/slice ratio. The R22SDF was more efficient than the R4SDC in terms of throughput per area due to a simpler controller and an easier balanced rounding scheme. This paper also shows that balanced stage rounding is an appropriate rounding scheme for pipeline FFT processors.


reconfigurable computing and fpgas | 2010

Energy-Memory-Security Tradeoffs in Distributed Sensor Networks

Shaunak Shah; Rajesh Velegalati; Jens-Peter Kaps; David D. Hwang

Security for sensor networks is challenging due to the resource-constrained nature of individual nodes, particularly their energy limitations. However, designing merely for energy savings may not result in a suitable security architecture. This paper investigates the inherent tradeoffs involved between energy, memory, and security robustness in distributed sensor networks. As a driver for the investigation, we introduce an energy-scalable key establishment protocol called cluster key grouping, which takes into account resource limitations in sensor nodes. We then define a metric (the security leakage factor) to quantify security robustness in a system. Finally, a framework called the security-memory-energy (SME) curve is presented that is used to evaluate and quantify the multi-metric tradeoffs involved in security design.


IEEE Journal of Solid-state Circuits | 2003

Design of portable biometric authenticators - energy, performance, and security tradeoffs

David D. Hwang; Dengwei Fu; Alan N. Willson

Biometrics have become a popular means for access control and authentication. As the processing power of embedded systems has grown, efforts have been made to perform biometrics locally on constrained devices such as smart cards. This paper presents the design and consumer application of a portable fingerprint biometric authenticator with the form factor of a key dongle (as an alternative to biometric smart cards). A thorough investigation has been performed to determine the tradeoffs between security, performance, and energy and to determine the secure partitioning between dongle and server. Such a device could be used for applications such as automotive access control, secure credit card payments, and related authentication scenarios.

Collaboration


Dive into the David D. Hwang's collaboration.

Top Co-Authors

Avatar

Ingrid Verbauwhede

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Alireza Hodjat

University of California

View shared research outputs
Top Co-Authors

Avatar

Bo-Cheng Lai

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shenglin Yang

University of California

View shared research outputs
Top Co-Authors

Avatar

Kris Tiri

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Yi Fan

University of California

View shared research outputs
Top Co-Authors

Avatar

Kazuo Sakiyama

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge