Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processor for isolated execution of cryptographic algorithms. The pro-tected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory, and general-and special-purpose registers. We outline the principles for secure software implementation of cryptographic algorithms in a processor equipped with the protected zone. We also demonstrate the efficiency and effectiveness of the protected zone by implementing major cryptographic algorithms, namely RSA, elliptic curve cryptography, and AES in the protected zone. In terms of time efficiency, softwar...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
This paper presents an hardware accelerator which can effectively improve the security and the perfo...
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provid...
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processo...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Recently, security on programs and data is strongly required in multitask open computer systems such...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
The growing problem of breaches in information security in recent years has created a demand for ear...
The growing problem of breaches in information security in recent years has created a demand for ear...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
This work illustrates the research activities related to the implementation of a suite of hardware c...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
This paper presents an hardware accelerator which can effectively improve the security and the perfo...
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provid...
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processo...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Recently, security on programs and data is strongly required in multitask open computer systems such...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
The growing problem of breaches in information security in recent years has created a demand for ear...
The growing problem of breaches in information security in recent years has created a demand for ear...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
This work illustrates the research activities related to the implementation of a suite of hardware c...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
This paper presents an hardware accelerator which can effectively improve the security and the perfo...
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provid...