Our mission

Cryptographic Engineering & Side-Channel Analysis (CESCA) Lab’s mission is to provide secure design and implementations of cryptographic systems in embedded hardware and software. The group actively works on emerging topics for physical attacks and countermeasures, including AI-assisted attacks and protection of machine learning models in embedded systems and cryptographic circuits.

Research Areas

Cryptographic Engineering & Side-Channel Analysis Lab

Our research covers, but is not limited to, the following topics

Physical attacks on embedded crypto devices

We evaluate the security of smartcards, mobile phones and IoT devices by exploiting power and EM measurements and fault injection. The goal is to come up with mitigations against those attacks.

embedded

Secure cryptographic implementations

Crypto implementation should resist attacks that are of concern in real-world use cases. Such hardened implementations should fit the constraints on performance, power and energy.

dpa

FPGA security

FPGAs are increasingly popular platforms thanks to their (software-like) ability to be reconfigured after deployment and their (hardware-like) high performance and low power consumption. In securing FPGA-based systems, reconfigurability is an asset that can be used for protection against physical attacks.

fpgas

AI and security

AI methods have become common in security evaluations of embedded devices. Conversely, implementations of neural nets are often considered trade secrets. Attack vectors to reverse engineer neural nets is using side channels and fault injection. We are working on both of those research directions, so AI for security and the security of AI.

usenix

Lightweight cryptography

Lightweight crypto is important to ensure security in constrained environments. We work on efficient implementations of such algorithms in hardware and software considering relevant physical attacks.

subterranean

Leakage simulators

A leakage simulator allows the transformation of high-level code into traces similar to those collected from the target architecture. We work on the next generation of tools to automate the creation of secure hardware.

simulator
Featured Posts

PhD defence of Unai Rioja and Niels Samwel

We are proud to announce the dates for the PhD defences of our members Unai and Niels : Location: Aula

CARDIS 2022

CARDIS 2022 will take place from 7 to 9 November, 2022 in Birmingham, UK. The program chairs are Ileana Buhan (Radboud University, NL) and Tobias…

SPACE 2022

SPACE 2022 will be held from 8th to 11th December, 2022 in Jaipur, India. The program co-chairs are Lejla Batina (Radboud University, The Netherlands), Mainack…