Abstract—In this paper, a lightweight processor suitable for lightweight cryptographic applications is presented. The processor instruction set is based on the stack-based ZPU architecture. In addition, a simple generic plug-in interface is implemented in order to allow integration of application specific coprocessors to the main processor core. In the current version of the processor, a simple direct memory access engine and a serialized Klein cipher coprocessor are implemented and connected to the processor core. Through these engines, it is possible to implement various lightweight security and authentication schemes in a code and area effective way. A simple assembler code is written and tested on the processor in order to verify the fu...
In recent years more and more security sensitive applications use passive smart devices such as cont...
In the bachelor thesis Lightweight cryptography I describe the basics of light cryptography, analyze...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
Abstract—With myriads of small and pervasive devices in our digital age, the availability of low-pow...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and ...
This bachelor thesis deals with the topic of lightweight cryptography and the implementation of a se...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
This thesis addresses lightweight hardware design and countermeasures to improve cryptographic compu...
In recent years more and more security sensitive applications use passive smart devices such as cont...
In the bachelor thesis Lightweight cryptography I describe the basics of light cryptography, analyze...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
Abstract—With myriads of small and pervasive devices in our digital age, the availability of low-pow...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and ...
This bachelor thesis deals with the topic of lightweight cryptography and the implementation of a se...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
This thesis addresses lightweight hardware design and countermeasures to improve cryptographic compu...
In recent years more and more security sensitive applications use passive smart devices such as cont...
In the bachelor thesis Lightweight cryptography I describe the basics of light cryptography, analyze...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...