We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processor for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory, and general and special-purpose registers. We outline the principles for secure software implementation of cryptographic algorithms in a processor equipped with the protected zone. We also demonstrate the efficiency and effectiveness of the protected zone by implementing major cryptographic algorithms, namely RSA, elliptic curve cryptography, and AES in the protected zone. In terms of time efficiency, software impleme...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
Recently, security on programs and data is strongly required in multitask open computer systems such...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
Recently, security on programs and data is strongly required in multitask open computer systems such...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...