Cryptographic algorithm agility, i.e., the capability to switch between several encryption algorithms, has become a desirable feature due to the algorithm-independent design paradigm of modern security protocols. This MQP describes the design and implementation of an algorithm-agile cryptographic co-processor board. The core of the board is an FPGA, which can be dynamically configured with a variety of block ciphers. The FPGA is capable of data encryption at high speeds through an ISA bus interface. The board contains a Ram with an algorithm library, i.e., a collection of FPGA configuration files. The library can be updated during operation
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
The technical analysis used in determining which ofthe potential Advanced Encryption Standard candid...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
Abstract — Tiled architectures are emerging as an architectural platform that allows high levels of ...
n October 2000 the National Institute of Standards and Technology chose Rijndael algorithm as the ne...
Tradeoffs of speed vs. area that are inherent in the design of a security coprocessor are explored. ...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
The technical analysis used in determining which ofthe potential Advanced Encryption Standard candid...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
Abstract — Tiled architectures are emerging as an architectural platform that allows high levels of ...
n October 2000 the National Institute of Standards and Technology chose Rijndael algorithm as the ne...
Tradeoffs of speed vs. area that are inherent in the design of a security coprocessor are explored. ...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...