Abstract—This paper describes the design of a programmable coprocessor for Public Key Cryptography (PKC) on an FPGA. The implementation provides a very broad range of functions together with countermeasures against Side-Channel Analysis (SCA) attacks. The functions are implemented in a hierarchical manner, where all levels are accessible by the user. This makes the coprocessor very flexible and particularly suitable to be used in embedded environments where the border between hardware and software needs to be decided depending on the application. Especially for RSA, the resulting implementation on an XC3S5000 FPGA, from the low-cost Spartan series of Xilinx, shows comparable performance figures compared to the state-of-the-art in PKC coproc...
In this paper we present an hardware implementation of the RSA algorithm for public-key cryptography...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
The growing problem of breaches in information security in recent years has created a demand for ear...
This paper presents an hardware accelerator which can effectively improve the security and the perfo...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
Security ICs are vulnerable to side-channel attacks (SCAs) that find the secret key by monitoring th...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
Abstract—The security threat of side-channel analysis (SCA) attacks has created a need for SCA count...
We describe a general-purpose processor architecture for accelerating public-key computations on ser...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
With today's great demand for secure communications systems, there is a growing demand for real-time...
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attac...
In this paper we present an hardware implementation of the RSA algorithm for public-key cryptography...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
The growing problem of breaches in information security in recent years has created a demand for ear...
This paper presents an hardware accelerator which can effectively improve the security and the perfo...
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the c...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
Security ICs are vulnerable to side-channel attacks (SCAs) that find the secret key by monitoring th...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
Abstract—The security threat of side-channel analysis (SCA) attacks has created a need for SCA count...
We describe a general-purpose processor architecture for accelerating public-key computations on ser...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
With today's great demand for secure communications systems, there is a growing demand for real-time...
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attac...
In this paper we present an hardware implementation of the RSA algorithm for public-key cryptography...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These a...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...