Trustworthy Manufacturing and Utilization of Secure Devices

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: closed (30 September 2018) | Viewed by 484

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, Universidad Carlos III de Madrid, 28903 Getafe, Madrid, Spain
Interests: hardware security; cryptography; signal processing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
LIRMM, Laboratoire d'Informatique, de Robotique et de Microélectronique de Montpellier, Département de Microélectronique, 161 rue Ada, 34392 Montpellier, France
Interests: design and test of secure circuits; hardware security and trust; reliability of digital systems

E-Mail Website
Guest Editor
Carlos III University of Madrid, Department of Electronic Technology, Avenida de la Universidad, 30, 28911 Leganés, Madrid, Spain
Interests: hardware security; low-power design; criptography
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In the last few decades, there have been important advances to guarantee the security and trust of information and communication systems. This has resulted in a wide variety of cryptography protocols and primitives, and their implementation in hardware devices. In the last years, attackers have moved their efforts on discovering security weaknesses from the algorithms and protocols to the hardware implementation of those systems. Moreover, hardware trust issues also became highly relevant in the last few years. For all of the above, hardware security and trust is becoming increasingly important for many embedded system applications, ranging from implantable medical devices to any sort of smart meters. Moreover, relevance is expected to increase in the uncoming years as consequence of a highly-connected world due to paradigms like "Internet-of-Things" or “Smart-cities” in which the security and the trust of the devices is fundamental.

This Special Issue on “Trustworthy Manufacturing and Utilization of Secure Devices” is a step towards stimulating more open scientific discussions on new solutions and trends responding to the main hardware security and trust challenges.

Dr. Pedro Peris-Lopez
Dr. Giorgio Di Natale
Dr. Honorio Martin
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

 

Keywords

  • Manufacturing test of secure devices
  • Trustworthy manufacturing of secure devices
  • Physical Unclonable Functions (PUFs)
  • True Random Number Generators
  • Hardware Trojans
  • Reverse engineering countermeasures
  • Emerging technologies for security primitives
  • Reconfigurable devices for secure functions
  • Fault attack injection
  • Detection and protection of malicious components
  • Validation and evaluation

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop