Jamshid Shokrollahi
University of Bonn
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jamshid Shokrollahi.
cryptographic hardware and embedded systems | 2008
Christoph Bösch; Jorge Guajardo; Ahmad-Reza Sadeghi; Jamshid Shokrollahi; Pim Tuyls
Physical Unclonable Functions (PUFs) have properties that make them very attractive for a variety of security-related applications. Due to their inherent dependency on the physical properties of the device that contains them, they can be used to uniquely bind an application to a particular device for the purpose of IP protection. This is crucial for the protection of FPGA applications against illegal copying and distribution. In order to exploit the physical nature of PUFs for reliable cryptography a so-called helper data algorithm or fuzzy extractor is used to generate cryptographic keys with appropriate entropy from noisy and non-uniform random PUF responses. In this paper we present for the first time efficient implementations of fuzzy extractors on FPGAs where the efficiency is measured in terms of required hardware resources. This fills the gap of the missing building block for a full FPGA IP protection solution. Moreover, in this context we propose new architectures for the decoders of Reed-Muller and Golay codes, and show that our solutions are very attractive from both the area and error correction capability points of view.
Eurasip Journal on Information Security | 2007
Zekeriya Erkin; Alessandro Piva; Stefan Katzenbeisser; Reginald L. Lagendijk; Jamshid Shokrollahi; Gregory Neven; Mauro Barni
The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready-togo fully integrated solutions are available. This study first concisely summarizes cryptographic primitives used in existing solutions to processing of encrypted signals, and discusses implications of the security requirements on these solutions. The study then continues to describe two domains in which secure signal processing has been taken up as a challenge, namely, analysis and retrieval of multimedia content, as well as multimedia content protection. In each domain, state-of-the-art algorithms are described. Finally, the study discusses the challenges and open issues in the field of secure signal processing.
international conference on selected areas in cryptography | 2005
Joachim von zur Gathen; Jamshid Shokrollahi
We study different possibilities of implementing the Karatsuba multiplier for polynomials over F 2 on FPGAs. This is a core task for implementing finite fields of characteristic 2. Algorithmic and platform dependent optimizations yield efficient hardware designs. The resulting structure is hybrid in two different aspects. On the one hand, a combination of the classical and the Karatsuba methods decreases the number of bit operations. On the other hand, a mixture of sequential and combinational circuit design techniques includes pipelining and can be adapted flexibly to time-area constraints. The approach-both theory and implementation _ can be viewed as a further step towards taming the machinery of fast algorithmics for hardware applications.
international conference on arithmetic of finite fields | 2007
Joachim von zur Gathen; Amin Shokrollahi; Jamshid Shokrollahi
In this paper we propose a new structure for multiplication using optimal normal bases of type 2. The multiplier uses an efficient linear transformation to convert the normal basis representations of elements of
international symposium on circuits and systems | 2002
Marcus Bednara; M. Daldrup; Jürgen Teich; J. von zur Gathen; Jamshid Shokrollahi
\mathbb{F}_{q^{n}}
selected areas in cryptography | 2007
Elisa Gorla; Christoph Puttmann; Jamshid Shokrollahi
to suitable polynomials of degree at most nover
information theory workshop | 2006
J. von zur Gathen; Jamshid Shokrollahi
\mathbb{F}_{q}
international symposium on circuits and systems | 2003
Cornelia Grabbe; Marcus Bednara; Jürgen Teich; J. von zur Gathen; Jamshid Shokrollahi
. These polynomials are multiplied using any method which is suitable for the implementation platform, then the product is converted back to the normal basis using the inverse of the above transformation. The efficiency of the transformation arises from a special factorization of its matrix into sparse matrices. This factorization -- which resembles the FFT factorization of the DFT matrix -- allows to compute the transformation and its inverse using O(nlogn) operations in
international conference on information technology new generations | 2008
Christoph Puttmann; Jamshid Shokrollahi; Mario Porrmann
\mathbb{F}_{q}
field-programmable logic and applications | 2007
Jamshid Shokrollahi; Elisa Gorla; Christoph Puttmann
, rather than O(n2) operations needed for a general change of basis. Using this technique we can reduce the asymptotic cost of multiplication in optimal normal bases of type 2 from reported by Gao et al. (2000) to M (n) + O(nlogn) operations in