Papers by Miguel Morales-sandoval
Information and Communications Security
Lightweight block ciphers are today of paramount importance to provide security services in const... more Lightweight block ciphers are today of paramount importance to provide security services in constrained environments. Recent studies have questioned the security properties of Present, which makes it evident the need to study alternative ciphers. In this work we provide hardware architectures for Midori and GIFT, and compare them against implementations for Present and Gimli under fair conditions. The hardware description for our designs is made publicly available.
Implementación Hardware de Esquemas de Criptografía de Curvas Elípticas
Hacia la implementación y diseño de una arquitectura interoperable para criptografía de curvas elípticas
Arquitectura Hardware de un Procesador Matricial
DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption
Lecture Notes in Computer Science, 2015
Bit-serial and digit-serial GF(2
Notas sobre Compresión de Datos
Compresión de Datos+ Criptografía
List of publications of Miguel Morales Sandoval, PhD in Computer Science
NO INCLUIR EL NOMBRE DE LOS AUTORES O INSTITUCIONES (Recuerde que es revisión anónima)
Study on the robustness to retyping attacks of fingerprinted digital documents in the frequential domain
The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), 2014
In this PhD. research it is proposed to analyze, design and evaluate a dynamically reconfigurable... more In this PhD. research it is proposed to analyze, design and evaluate a dynamically reconfigurable hardware archi- tecture for elliptic curve cryptography (ECC). Such archi- tecture is a proposal to solve the interoperability problemin ECC. Different to work reported in the literature, in which the ECC architecture needs to be reconfigured off line to support different security levels, the proposed

Journal of Physics: Conference Series, 2005
The explosive growth of internet and consumer demand for mobility has fuelled the exponential gro... more The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the Wired Equivalent Privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the Advanced Encryption Standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A Field Programmable Gate Array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.
Evaluation of machine learning techniques for prostate cancer diagnosis and Gleason grading
International Journal of Computational Intelligence in Bioinformatics and Systems Biology, 2010
... for acquisition, processing and analysis of images from biopsies is of special importance (Bo... more ... for acquisition, processing and analysis of images from biopsies is of special importance (Bostwick et al., 2000; Saidi et al., 2007 ... Notes: The remaining attributes of the best performing attribute setare: Entropy, Energy, Inverse Difference Moment, Correlation, Sum Average, Sum ...

12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06), 2006
Internet-enabled. Securely and quickly establishing a session key between communicating nodes in ... more Internet-enabled. Securely and quickly establishing a session key between communicating nodes in a network requires authentication of node identities. In this paper, we propose a simple elliptic-curve based key negotiation protocol suitable for fully hardware implementation as a protocol on chip (PoC). The protocol uses the elliptic curve variants of both the Diffie Hellmann exchange and the Digital Signature Algorithm. Timing results demonstrate that an endto-end protocol run can be performed in as little as 28ms on a 25MHz clock, which is several times faster than previous microprocessor-based implementations of similar protocols. The results indicate that session keys can thereby have shorter lifetimes, since there is little computational overhead in re-generating them, thus enhancing overall security of the networked embedded systems.

EURASIP Journal on Embedded Systems, 2007
The secure establishment of cryptographic keys for symmetric encryption via key agreement protoco... more The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure environment. In this paper, we propose a pure hardware implementation of a key agreement protocol, which uses the elliptic curve Diffie-Hellmann and digital signature algorithms and enables two parties, a remote agent and a networked embedded system, to establish a 128-bit symmetric key for encryption of all transmitted data via the advanced encryption scheme (AES). The resulting implementation is a protocol-on-chip that supports full 128-bit equivalent security (PoC-128). The PoC-128 has been implemented in an FPGA, but it can also be used as an IP within different embedded applications. As 128-bit security is conjectured valid for the foreseeable future, the PoC-128 goes well beyond the state of art in securing networked embedded devices.

Arquitectura FPGA para un Procesador Matricial
Matrix multiplicationa is a common operation in science and engineering but, it is computationaly... more Matrix multiplicationa is a common operation in science and engineering but, it is computationaly expensive. An alternative to increase computing performance is the development of specific hardware architectures with parallel structures. This work presents a hardware architecture for parallel matrix multiplication implemented in an FPGA device. The design is centered around a bidimensional array of processing elements. The architecture details and some performance results are presented. Resumen: La multiplicación de matrices es una operación muy común en ciencias e ingeniería, sin embargo, su costo computacional es elevado; por lo que es necesario disponer de alternativas para la ejecución de esta tarea de manera eficiente disminuyendo el tiempo de procesamiento que es muy importante en diversas aplicaciones. Este trabajo presenta una arquitectura para la multiplicación paralela de matrices en un dispositivo FPGA. El diseño que se presenta utiliza una matriz de elementos procesadores que realizan la multiplicación de matrices. Palabras Clave: Procesador Matricial, FPGA, Handel-C.
PloS one, 2013
Digital fingerprinting is a technique that consists of inserting the ID of an authorized user in ... more Digital fingerprinting is a technique that consists of inserting the ID of an authorized user in the digital content that he requests. This technique has been mainly used to trace back pirate copies of multimedia content such as images, audio, and video. This study proposes the use of state-of-the-art digital fingerprinting techniques in the context of restricted distribution of digital documents. In particular, the system proposed by Kuribayashi for multimedia content is investigated. Extensive simulations show the robustness of the proposed system against average collusion attack. Perceptual transparency of the fingerprinted documents is also studied. Moreover, by using an efficient Fast Fourier Transform core and standard computer machines it is shown that the proposed system is suitable for real-world scenarios.
Uploads
Papers by Miguel Morales-sandoval