Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Philippe Bulens is active.

Publication


Featured researches published by Philippe Bulens.


international conference on progress in cryptology | 2008

Implementation of the AES-128 on virtex-5 FPGAs

Philippe Bulens; François-Xavier Standaert; Jean-Jacques Quisquater; Pascal Pellegrin; Gaël Rouvroy

This paper presents an updated implementation of the Advanced Encryption Standard (AES) on the recent Xilinx Virtex-5 FPGAs. We show how a modified slice structure in these reconfigurable hardware devices results in significant improvement of the design efficiency. In particular, a single substitution box of the AES can fit in 8 FPGA slices. We combine these technological changes with a sound intertwining of the round and key round functionalities in order to produce encryption and decryption architectures that perfectly fit with the Digital Cinema Initiative specifications. More generally, our implementations are convenient for any application requiring Gbps-range throughput.


field-programmable technology | 2004

An improved Montgomery modular inversion targeted for efficient implementation on FPGA

G.M. de Dormale; Philippe Bulens; Jean-Jacques Quisquater

Modular multiplication and inversion/division are the most common primitives in todays public key cryptography. Elliptic curve public key cryptosystems (ECPKC) are becoming increasingly popular for use in mobile appliances where bandwidth and chip area are strongly constrained. For the same level of security, ECPKC use much smaller key length than the commonly used RSA but need modular inversion/division. This work presents an improved algorithm for prime field Montgomery modular inversion. The first important contribution lies in the reduction of the number of operations needed. Resource sharing is also used to lighten the control part of the algorithm. The second contribution is the minimization of the set of different instructions to enable powerful FPGA implementations. Resulting 256-bit circuit achieves a ratio throughput/area improved by at least 70% compared to the only known Montgomery inverse design in FPGA technology. Though the implementations are first oriented towards FPGA, some improvements are generic. So, they could prove to be also efficient for ASIC designs in terms of area and power consumption.


cryptographic hardware and embedded systems | 2007

Collision Search for Elliptic Curve Discrete Logarithm over GF(2m) with FPGA

Guerric Meurice de Dormale; Philippe Bulens; Jean-Jacques Quisquater

In this last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. This interest is mainly due to the high level of security with relatively small keys provided by ECC. Indeed, no sub-exponential algorithms are known to solve the underlying hard problem: the Elliptic Curve Discrete Logarithm. The aim of this work is to explore the possibilities of dedicated hardware implementing the best known algorithm for generic curves: the parallelized Pollards ρmethod. This problem has specific constraints and requires therefore new architectures. Four different strategies were investigated with different FPGA families in order to provide the best area-time product, according to the capabilities of the chosen platforms. The approach yielding the best throughput over hardware cost ratio is then fully described and was implemented in order to estimate the cost of an attack. Such results should help to improve the accuracy of the security level offered by a given key size, especially for the shorter parameters proposed for resource constrained devices.


european public key infrastructure workshop | 2008

Fault Attacks on Public Key Elements: Application to DLP-Based Schemes

Chong Hee Kim; Philippe Bulens; Christophe Petit; Jean-Jacques Quisquater

Many cryptosystems suffer from fault attacks when implemented in physical devices such as smart cards. Fault attacks on secret key elements have successfully targeted many protocols relying on the Elliptic Curve Discrete Logarithm Problem (ECDLP), the Integer Factorization Problem (IFP) or the Discrete Logarithm Problem (DLP). More recently, faults attacks have also been designed against the publickey elements of ECDLP and IFP-based schemes. In this paper, we present the first fault attacks on the public key elements of DSA and ElGamal, two DLP-based signature schemes. Our attacks fully recover a 160-bit DSA secret key and a 1024-bit ElGamal secret key with ~4 ·107and ~3 ·106faulty signatures respectively. Such figures might suggest that DLP-based schemes are less prone to fault attacks than ECDLP- and IFP-based schemes. However, the integrity of public keys should always be checked in order to thwart such attacks since improvements may reduce the required amount of faulty signatures in the near future.


field-programmable logic and applications | 2004

Efficient Modular Division Implementation

Guerric Meurice de Dormale; Philippe Bulens; Jean-Jacques Quisquater

Elliptic Curve Public Key Cryptosystems (ECPKC) are becoming increasingly popular for use in mobile appliances where bandwidth and chip area are strongly constrained. For the same level of security, ECPKC use much smaller key length than the commonly used RSA. The underlying operation of affine coordinates elliptic curve point multiplication requires modular multiplication, division/inversion and addition/substraction. To avoid the critical division/inversion operation, other coordinate systems may be chosen, but this implies more operations and a strong increase in memory requirements. So, in area and memory constrained devices, affine coordinates should be preferred, especially over GF(p).


Iet Information Security | 2010

How to strongly link data and its medium: the paper case

Philippe Bulens; François-Xavier Standaert; Jean-Jacques Quisquater


conference on electronic voting technology workshop on trustworthy elections | 2011

Running mixnet-based elections with Helios

Philippe Bulens; Damien Giry; Olivier Pereira


Proceedings of SASC 2007 | 2007

FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile

Philippe Bulens; Kassem Kalach; François-Xavier Standaert; Jean-Jacques Quisquater


IACR Cryptology ePrint Archive | 2008

Improving the Rules of the DPA Contest

François-Xavier Standaert; Philippe Bulens; Giacomo de Meulenaer; Nicolas Veyrat-Charvillon


Archive | 2009

Mathematical and physical concerns regarding cryptographic key length

Philippe Bulens

Collaboration


Dive into the Philippe Bulens's collaboration.

Top Co-Authors

Avatar

Jean-Jacques Quisquater

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

François-Xavier Standaert

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

G.M. de Dormale

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

Guerric Meurice de Dormale

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

Chong Hee Kim

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

Christophe Petit

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

Gaël Rouvroy

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

Giacomo de Meulenaer

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

Kassem Kalach

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

Nicolas Veyrat-Charvillon

Université catholique de Louvain

View shared research outputs
Researchain Logo
Decentralizing Knowledge