Warning: include_once(header.php): failed to open stream: No such file or directory in /home/users/hostsymposium/htdocs/host2019/speakers/IngridVerbauwhede.php on line 4

Warning: include_once(): Failed opening 'header.php' for inclusion (include_path='.:') in /home/users/hostsymposium/htdocs/host2019/speakers/IngridVerbauwhede.php on line 4

Warning: include_once(site-header.php): failed to open stream: No such file or directory in /home/users/hostsymposium/htdocs/host2019/speakers/IngridVerbauwhede.php on line 10

Warning: include_once(): Failed opening 'site-header.php' for inclusion (include_path='.:') in /home/users/hostsymposium/htdocs/host2019/speakers/IngridVerbauwhede.php on line 10

Professor Ingrid Verbauwhede

Ingrid Verbauwhede

Tuesday, May 7th, 2019 | Time: 08:30 - 10:15

Bio: Dr. Ir. Ingrid Verbauwhede is a Professor in the research group COSIC of the Electrical Engineering Department of the KU Leuven. She is also adjunct professor at UCLA, USA. At COSIC, she leads the secure embedded systems and hardware group. She is a Member of IACR and a fellow of IEEE. She was elected as member of the Royal Flemish Academy of Belgium for Science and the Arts in 2011. She is a recipient of an ERC Advanced Grant in 2016 and received the IEEE 2017 Computer Society Technical Achievement Award. She is a pioneer in the field of efficient and secure implementations of cryptographic algorithms in embedded context on ASIC, FPGA and embedded SW. She is the author and co-author of more than 300 publications at conferences, journals, book chapters and books. Her Google Scholar link is available from: https://scholar.google.be/citations?user=ZyG1ZGgAAAAJ&hl=en&oi=ao Her list of publications and patents is available at https://www.esat.kuleuven.be/cosic/publications/

Title: The Need for Hardware Roots of Trust

Abstract: Software security and cryptographic security protocols rely on hardware roots of trust. Software designers assume that cryptographic keys, random initial values, nonces, freshness, hardware isolation, or secure storage is simply available to them. At the same time, electronics shrink: sensor nodes, IOT devics, smart devices are becoming more and more available. Adding security and cryptography to these often very resource constraint devices is a challenge. This presentation will focus design methods for hardware roots of trustor and more specifically on Physically Unclonable Functions (PUFs) and True Random Number Generators (TRNG), two essential roots of trust.


Warning: include_once(site-footer.php): failed to open stream: No such file or directory in /home/users/hostsymposium/htdocs/host2019/speakers/IngridVerbauwhede.php on line 42

Warning: include_once(): Failed opening 'site-footer.php' for inclusion (include_path='.:') in /home/users/hostsymposium/htdocs/host2019/speakers/IngridVerbauwhede.php on line 42