@conference {18477, title = {Challenges in designing trustworthy cryptographic co-processors}, booktitle = {IEEE International Symposium on Circuits and Systems (ISCAS) 2015}, year = {2015}, month = {09/2015}, pages = {2009-2012}, publisher = {IEEE}, organization = {IEEE}, address = {Lisbon, Portugal}, abstract = {Security is becoming ubiquitous in our society. However, the vulnerability of electronic devices that implement the needed cryptographic primitives has become a major issue. This paper starts by presenting a comprehensive overview of the existing attacks to cryptography implementations. Thereafter, the state-of-the-art on some of the most critical aspects of designing cryptographic co-processors are presented. This analysis starts by considering the design of asymmetrical and symmetrical cryptographic primitives, followed by the discussion on the design and online testing of True Random Number Generation. To conclude, techniques for the detection of Hardware Trojans are also discussed}, keywords = {asymmetrical cryptographic primitives, cryptography, hardware Trojan detection techniques}, issn = {0271-4302 }, doi = {10.1109/ISCAS.2015.7169070}, url = {http://dx.doi.org/10.1109/ISCAS.2015.7169070}, author = {Regazzoni, Francesco and Graves, Ricardo and Di Natale, Giorgio and Batina, Lejla and Bhasin, Shivam and Ege, Baris and Fournaris, Apostolos P. and Mentens, Nele and Picek, Stjepan and Rozic, Vladimir and Sklavos, Nicolas and Yang, Bohan} }