Fomentamos la colaboración
para la transformación digital
y la sostenibilidad.

Creamos un espacio de encuentro y colaboración entre empresas y entidades para el desarrollo de soluciones innovadoras que mejoren su competitividad en cualquier sector.

Transformación con propósito.

Sign in/up

¡Bienvenido a la Plataforma de Open Innovation del ecosistema Secartys!

Busca una
oportunidad

¿Quieres ser parte de un proyecto? Busca una oportunidad y aporta tu solución.

Express interest
Post-Snowden Circuits and Design Methods for Security
created · Updated
Deadline: Feb 28, 2022
Received 0 expressions of interest

Summary

Summary: Comprehensive set of circuits and design methods to create next generation electronic circuits with strong built-in trust and security. Electronics are integrating/invading into the human environment at an amazing speed, called the Internet-of-Things and next...

Description

Summary: Comprehensive set of circuits and design methods to create next generation electronic circuits with strong built-in trust and security. <br/> Electronics are integrating/invading into the human environment at an amazing speed, called the Internet-of-Things and next the Internet-of-Everything. This creates huge security problems. Distributed (e.g. body) sensors, pick up often very private data, which is sent digitally into the cloud, over wireless and wired links. Protection of this data relies on high-quality cryptographic algorithms and protocols. The nodes need to be cheap and lightweight, making them very vulnerable to eavesdropping and abuse. Moreover, post-Snowden, society realizes that the attack capabilities of intelligence agencies, and probably following soon of organized crime and other hackers, are orders of magnitude stronger than imagined. Thus there is a strong demand to re-establish trust in ICT systems. <br/> In this proposal we focus on the root of trust: the digital hardware. The overall objective is to provide fundamental enabling technologies for secure trustworthy digital circuits which can be applied in a wide range of applications. To master complexity, digital hardware design is traditionally split into different abstraction layers. We revisit these abstraction layers from a security viewpoint: we look at process variations to the benefit of security, standard cell compatible digital design flow with security as design objective, hardware IP blocks for next generation cryptographic algorithms and protocols (e.g. authenticated encryption schemes, post-quantum public key schemes), integration into embedded HW/SW platforms, and methods to provide trust evidence to higher levels of abstraction. To strengthen the security we investigate the links between the layers. Finally an embedded application is selected as design driver, the security evaluation of which will be fed back to the individual layers.

Crea una
oportunidad

Publica tu proyecto, idea, reto o necesidad y genera el interés de potenciales colaboradores o proveedores.

Latest Opportunities

OPORTUNIDAD PLANTAS SOLARES LETONIA

published
Deadline: Oct 31, 2025
El proyecto consiste en el desarrollo, la construcción y la operación de una cartera de plantas solares fotovoltaicas que incluye cuatro plantas de energía solar, con una capacidad total de 325 MW en Letonia. La entidad prestataria es Sunly Holding.

Únete y crea
tu ecosistema

Conoce, conecta e interactúa con expertos de todo el ecosistema Secartys gracias a las diferentes funcionalidades de Secartys INNOVA.

Podrás crear espacios privados, generar listas de oportunidades, publicar tus proyectos, conocer las propuestas de otros y activar alertas en función de tus intereses.

¡Crea tu perfil y da paso a la innovación!

Paco Robles
Construye tu proyecto
con los mejores
profesionales del sector

Fomentamos la colaboración para la transformación digital y la sostenibilidad.

¡ÚNETE AHORA!