Robert P. McEvoy
University College Cork
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Robert P. McEvoy.
ieee computer society annual symposium on vlsi | 2006
Robert P. McEvoy; Francis M. Crowe; Colin C. Murphy; William P. Marnane
Hash functions play an important role in modern cryptography. This paper investigates optimisation techniques that have recently been proposed in the literature. A new VLSI architecture for the SHA-256 and SHA-512 hash functions is presented, which combines two popular hardware optimisation techniques, namely pipelining and unrolling. The SHA processors are developed for implementation on FPGAs, thereby allowing rapid prototyping of several designs. Speed/area results from these processors are analysed and are shown to compare favourably with other FPGA-based implementations, achieving the fastest data throughputs in the literature to date
international conference of the ieee engineering in medicine and biology society | 2010
Garry Higgins; Stephen Faul; Robert P. McEvoy; Brian McGinley; Martin Glavin; William P. Marnane; Edward Jones
Compression of biosignals is an important means of conserving power in wireless body area networks and ambulatory monitoring systems. In contrast to lossless compression techniques, lossy compression algorithms can achieve higher compression ratios and hence, higher power savings, at the expense of some degradation of the reconstructed signal. In this paper, a variant of the lossy JPEG2000 algorithm is applied to Electroencephalogram (EEG) data from the Freiburg epilepsy database. By varying compression parameters, a range of reconstructions of varying signal fidelity is produced. Although lossy compression has been applied to EEG data in previous studies, it is unclear what level of signal degradation, if any, would be acceptable to a clinician before diagnostically significant information is lost. In this paper, the reconstructed EEG signals are applied to REACT, a state-of-the-art seizure detection algorithm, in order to determine the effect of lossy compression on its seizure detection ability. By using REACT in place of a clinician, many hundreds of hours of reconstructed EEG data are efficiently analysed, thereby allowing an analysis of the amount of EEG signal distortion that can be tolerated. The corresponding compression ratios that can be achieved are also presented.
workshop on information security applications | 2007
Robert P. McEvoy; Michael Tunstall; Colin C. Murphy; William P. Marnane
The HMAC algorithm is widely used to provide authentication and message integrity to digital communications. However, if the HMAC algorithm is implemented in embedded hardware, it is vulnerable to side-channel attacks. In this paper, we describe a DPA attack strategy for the HMAC algorithm, based on the SHA-2 hash function family. Using an implementation on a commercial FPGA board, we show that such attacks are practical in reality. In addition, we present a masked implementation of the algorithm, which is designed to counteract first-order DPA attacks.
ACM Transactions on Reconfigurable Technology and Systems | 2009
Robert P. McEvoy; Colin C. Murphy; William P. Marnane; Michael Tunstall
Security protocols are frequently accelerated by implementing the underlying cryptographic functions in reconfigurable hardware. However, unprotected hardware implementations are susceptible to side-channel attacks, and Differential Power Analysis (DPA) has been shown to be especially powerful. In this work, we evaluate and compare the effectiveness of common hiding countermeasures against DPA in FPGA-based designs, using the Whirlpool hash function as a case study. In particular, we develop a new design flow called Isolated WDDL (IWDDL). In contrast with previous works, IWDDL isolates the direct and complementary circuit paths, and also provides DPA resistance in the Hamming distance power model. The analysis is supported using actual implementation results.
IEEE Journal of Biomedical and Health Informatics | 2013
Garry Higgins; Brian McGinley; Stephen Faul; Robert P. McEvoy; Martin Glavin; William P. Marnane; Edward Jones
This paper examines the effects of compression on electroencephalogram (EEG) signals, in the context of automated detection of epileptic seizures. Specifically, it examines the use of lossy compression on EEG signals in order to reduce the amount of data which has to be transmitted or stored, while having as little impact as possible on the information in the signal relevant to diagnosing epileptic seizures. Two popular compression methods, JPEG2000 and SPIHT, were used. A range of compression levels was selected for both algorithms in order to compress the signals with varying degrees of loss. This compression was applied to the database of epileptiform data provided by the University of Freiburg, Germany. The real-time EEG analysis for event detection automated seizure detection system was used in place of a trained clinician for scoring the reconstructed data. Results demonstrate that compression by a factor of up to 120:1 can be achieved, with minimal loss in seizure detection performance as measured by the area under the receiver operating characteristic curve of the seizure detection system.
cryptographic hardware and embedded systems | 2009
Emmanuel Prouff; Robert P. McEvoy
The use of random permutation tables as a side-channel attack countermeasure was recently proposed by Coron [5]. The countermeasure operates by ensuring that during the execution of an algorithm, each intermediate variable that is handled is in a permuted form described by the random permutation tables. In this paper, we examine the application of this countermeasure to the AES algorithm as described in [5], and show that certain operations admit first-order side-channel leakage. New side-channel attacks are developed to exploit these flaws, using correlation-based and mutual information-based methods. The attacks have been verified in simulation, and in practice on a smart card.
international conference of the ieee engineering in medicine and biology society | 2010
Robert P. McEvoy; Stephen Faul; William P. Marnane
REACT (Real-Time EEG Analysis for event deteCTion) is a Support Vector Machine based technology which, in recent years, has been successfully applied to the problem of automated seizure detection in both adults and neonates. This paper describes the implementation of REACT on a commercial DSP microprocessor; the Analog Devices Blackfin®. The primary aim of this work is to develop a prototype system for use in ambulatory or in-ward automated EEG analysis. Furthermore, the complexity of the various stages of the REACT algorithm on the Blackfin processor is analysed; in particular the EEG feature extraction stages. This hardware profile is used to select a reduced, platform-aware feature set, in order to evaluate the seizure classification accuracy of a lower-complexity, lower-power REACT system.
International Journal of Information Security | 2014
Robert P. McEvoy; Michael Tunstall; Claire Whelan; Colin C. Murphy; William P. Marnane
Side-channel attacks on hardware implementations of cryptographic algorithms have recently been the focus of much attention in the research community. Differential power analysis (DPA) has been shown to be particularly effective at retrieving secret information stored within an implementation. The design of DPA-resistant systems that are efficient in terms of speed and area poses a significant challenge. All-or-Nothing Transforms are cryptographic transforms, which are currently employed in numerous applications. We examine All-or-Nothing Encryption systems from the DPA perspective. This paper shows that All-or-Nothing cryptosystems, whilst not preventing side-channel leakage, do fundamentally inhibit DPA attacks. Furthermore, we develop extensions to the All-or-Nothing protocol to strengthen the DPA resistance of the cryptosystem, providing a practical alternative to masking countermeasures for symmetric ciphers.
international conference on e-business and telecommunication networks | 2006
Robert P. McEvoy; Colin C. Murphy
All-or-Nothing Encryption is a useful technique which can heighten the security of block ciphers. It can also be used to design faster symmetric-key cryptosystems, by decreasing the number of required encryption operations at run-time. An open problem in the literature regards the speed of all-or-nothing encryption, which we address in this paper by combining two techniques from the literature, forming a new all-or-nothing mode of operation. Trade-offs in the implementation of this design are considered, and theoretical proofs of security are provided.
IEEE Transactions on Magnetics | 2013
Robert P. McEvoy; Martin McMenamin; Gabriel Ha; Jeffrey H. Lang; Padraig Cantillon-Murphy
This paper reports the development of self-deployed magnetic polygons at the centimeter scale. These permanent-magnet (NdFeB) devices can be folded into a constraining catheter for delivery, before spontaneously unfolding into a polygon upon extrusion. The devices use a combination of dipolar and quadrapolar magnetic components along their sides, which facilitate self-deployment. Four-, six-, and eight-sided devices are reported and the effects of varying the geometry, the number of sides, and the duty cycle of the quadrapolar sides are examined in simulation and through experimental testing. As well as self-deployment, two N-sided devices (N ∈ {4,6,8}) are capable of face-to-face magnetic mating of opposing north and south poles with a minimum of difficulty. This capability is justified by modeling of the systems magnetic potential energy, and by experimental validation. Optimized design parameters are proposed. Magnetic mating of two N-sided devices facilitates applications where access to an adjoining orifice is desirable with a minimally sized access port (e.g., in the case of minimally invasive surgical technology). Current and future applications are considered.