Secure Hardware

Hardware, like software is complex, and full of mistakes that attackers can exploit. However, unlike software, the electronics may leak data for example through electro-magnetic radiation. We are working on designs that reduce the leakage.

Scientific Staff

Prof.dr. Said Hamdioui

Physically unclonable functions

Personal profile                                          

Dr. Stjepan Picek

Cryptography, cybersecurity, evolutionary computation and machine learning

Personal profile