Special Issue "Trustworthy Manufacturing and Utilization of Secure Devices"

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: closed (15 May 2017)

Special Issue Editors

Guest Editor
Dr. Pedro Peris-Lopez

Carlos III University of Madrid, Department of Computer Science, Computer Security Lab (COSEC), Sabatini Building (2.2.A04), Avenida de la Universidad, 30, 28911, Leganés, Madrid, Spain
Website | E-Mail
Interests: hardware security; cryptography; signal processing
Guest Editor
Dr. Giorgio Di Natale

LIRMM, Laboratoire d'Informatique, de Robotique et de Microélectronique de Montpellier, Département de Microélectronique, 161 rue Ada, 34392 Montpellier, France
Website | E-Mail
Interests: design and test of secure circuits; hardware security and trust; reliability of digital systems
Guest Editor
Dr. Honorio Martin

Carlos III University of Madrid, Department of Electronic Technology, Avenida de la Universidad, 30, 28911, Leganés, Madrid, Spain
Website | E-Mail
Interests: hardware security; low-power design; criptography

Special Issue Information

Dear Colleagues,

In the last few decades, there have been important advances to guarantee the security and trust of information and communication systems. This has resulted in a wide variety of cryptography protocols and primitives, and their implementation in hardware devices. In the last years, attackers have moved their efforts on discovering security weaknesses from the algorithms and protocols to the hardware implementation of those systems. Moreover, hardware trust issues also became highly relevant in the last few years. For all of the above, hardware security and trust is becoming increasingly important for many embedded system applications, ranging from implantable medical devices to any sort of smart meters. Moreover, relevance is expected to increase in the uncoming years as consequence of a highly-connected world due to paradigms like "Internet-of-Things" or “Smart-cities” in which the security and the trust of the devices is fundamental.

This Special Issue on “Trustworthy Manufacturing and Utilization of Secure Devices” is a step towards stimulating more open scientific discussions on new solutions and trends responding to the main hardware security and trust challenges.

Dr. Pedro Peris-Lopez
Dr. Giorgio Di Natale
Dr. Honorio Martin
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) is waived for well-prepared manuscripts submitted to this issue. Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

 

Keywords

  • Manufacturing test of secure devices
  • Trustworthy manufacturing of secure devices
  • Physical Unclonable Functions (PUFs)
  • True Random Number Generators
  • Hardware Trojans
  • Reverse engineering countermeasures
  • Emerging technologies for security primitives
  • Reconfigurable devices for secure functions
  • Fault attack injection
  • Detection and protection of malicious components
  • Validation and evaluation

Published Papers

This special issue is now open for submission.
Back to Top