This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provides a protected and reliable computational environment, where data security and protection against malicious attacks to the system is assured. SC is strongly based on encryption algorithms and on the attestation of the executed functions. The use of SC on reconfigurable devices has the advantage of being highly adaptable to the application and the user requirements, while providing high performances. Moreover, it is adaptable to new algorithms, protocols, and threats. In this dissertation, high performance cryptographic units for symmetric encryption and hash functions, were designed in order to achieve a high performance SCM. Implementations ...
This work reports Partial Reconfiguration (PR) by which selected areas of an FPGA can be reconfigure...
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but a...
Abstract. The use of FPGAs for cryptographic applications is highly attractive for a variety of reas...
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provid...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
Nowadays, the information security has achieved a great importance, both when information is sent th...
International audienceReconfigurable architectures are being increasingly widely used thanks to thei...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
The performance of security applications can be greatly improved by accelerating the cryptographic a...
In this paper, the hardware implementation of the MD5 algorithm on reconfigurable devices, such as F...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
Summarization: In recent years the advantages of reconfigurable computing have make FPGAs important ...
The goal of this thesis is to design a hardware realization of circuit which will implement the AES ...
This work reports Partial Reconfiguration (PR) by which selected areas of an FPGA can be reconfigure...
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but a...
Abstract. The use of FPGAs for cryptographic applications is highly attractive for a variety of reas...
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provid...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
Nowadays, the information security has achieved a great importance, both when information is sent th...
International audienceReconfigurable architectures are being increasingly widely used thanks to thei...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
The performance of security applications can be greatly improved by accelerating the cryptographic a...
In this paper, the hardware implementation of the MD5 algorithm on reconfigurable devices, such as F...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
Summarization: In recent years the advantages of reconfigurable computing have make FPGAs important ...
The goal of this thesis is to design a hardware realization of circuit which will implement the AES ...
This work reports Partial Reconfiguration (PR) by which selected areas of an FPGA can be reconfigure...
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but a...
Abstract. The use of FPGAs for cryptographic applications is highly attractive for a variety of reas...