Table of contents

  • This session has been presented April 24, 2026 (11:00 - 12:00).

Description

  • Speaker

    Côme Allart - Inria

Two major changes are currently taking place in the embedded processor ecosystem: open source with the RISC-V instruction set, which could replace the ARM one, and post-quantum cryptography (PQC), which could replace classic asymmetric cryptography algorithms to resist quantum computers.
In this context, this thesis investigates the improvement of embedded processor performance, generally for generic applications and more specifically for PQC-related applications. To this end, a model-driven design method is proposed.
More specifically, this work focuses on in-order processors with out-of-order execution completion. We worked on the open source CVA6 processor, maintained by the OpenHW Foundation, to improve the performance of an existing processor and share our modifications.
The first contribution is the creation of a model of CVA6 performance, cycle-accurate and easier to modify than the hardware description of this processor. This model allows a quick design space exploration and thus to refine the microarchitectural specifications. Once this step is complete, these specifications are implemented in the processor pipeline using the model as a reference to ensure the new pipeline meets performance expectations.
Applying this method has led to an improvement in the performance of the CVA6 processor, especially with the creation of a superscalar pipeline, delivering an average gain of 30% on a set of benchmarks including CoreMark, Dhrystone and the Embench suite. These modifications have been integrated into the official CVA6 repository.
Finally, this same method is used to the accelerate PQC execution in this embedded processor by implementing the support for new instructions dedicated to accelerating the NTT functions of the ML-DSA signature algorithm into its superscalar pipeline. This results in a performance gain of a factor of 5.
This thesis thus demonstrates the value of model-driven processor design.

Autre

Présentation en Français (slides en Anglais) 

Talk in French (slides in English)

Practical infos

Next sessions

  • HDL simulation for Masked Software Verification

    • May 29, 2026 (10:00 - 11:00)

    • IETR - University of Rennes - Campus de BEAULIEU - Bâtiment 11D, salle numéro 18

    Speaker : Quentin Meunier - Sorbonne Univ. Lip6

    Masking is a countermeasure against Side-Channel Attacks (SCA) that aims to ensure that intermediate computations in an algorithm have secret-independent distributions through the use of random variables. This theoretically prevents SCAs, as power consumption is directly linked to the values manipulated by the program or hardware device. Designing a masking scheme is often non-trivial, and a[…]
    • SemSecuElec

    • Side-channel

  • Étude, caractérisation et détection de verrouillage d'anneaux oscillants utilisés dans les générateurs de nombres aléatoires.

    • May 29, 2026 (11:00 - 12:00)

    • IETR - University of Rennes - Campus de BEAULIEU - Bâtiment 11D, salle numéro 18

    Speaker : Eloise Delolme - LabHC

    Les générateurs de nombres aléatoires matériels basés sur des oscillateurs en anneau (RO-TRNGs) exploitent le jitter d’horloge comme source d’aléa afin de produire des séquences de bits aléatoires. Parmi ces architectures, le MURO-TRNG repose sur un modèle stochastique complexe qui suppose notamment l’indépendance des oscillateurs. Toutefois, dans la pratique, les oscillateurs en anneau sont[…]
    • SemSecuElec

    • TRNG

  • Chamois: Formally verified compilation for optimisation and security

    • June 26, 2026 (10:00 - 11:00)

    • IETR - University of Rennes - Campus de BEAULIEU - Bâtiment 11D, salle numéro 18

    Speaker : David MONNIAUX - CNRS - Verimag

    Embedded programs (including those on smart cards) are often developed in C and then compiled for the embedded processor. Sometimes they are modified by hand to incorporate countermeasures (fault attacks, etc.), but care must be taken to ensure that this does not disrupt normal program execution and that the countermeasure is actually adequate for blocking the attacks.In the process, it is[…]
    • SemSecuElec

    • Fault injection

    • Formal methods

  • Securing processor's microarchitecture against SCA in a post-quantum cryptography setting

    • October 16, 2026 (10:00 - 11:00)

    • IETR - University of Rennes - Campus de BEAULIEU - Bâtiment 11D, salle numéro 18

    Speaker : Vincent MIGLIORE - LAAS-CNRS

    Hardware microarchitecture is a well-known source of side-channel leakages, providing a notable security reduction of standard cryptographic algorithms (e.g. AES) if not properly addressed by software or hardware. In this talk, we present new design approaches to harden processor's microarchitecture against power-based side-channel attacks, relying on configurable and cascadable building blocks[…]
    • SemSecuElec

    • Side-channel

    • Micro-architectural vulnerabilities

Show previous sessions