Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach to the existing solution, the Trusted Computing module chip. The new Trusted Computing approach to computation provides additional safety to the user’s data and a higher protection against malicious attacks to the systems. The features proposed by the Trusted Computing Group include secure I/O, memory curtaining, sealed storage and remote attestation, which have a strong dependency on the existing algorithms. A overview to the performance of the already implemented encryption algorithms required for the Trusted Computing is also presented. As a test and prototype platform the Molen [19] computational paradigm has been used. The results sugges...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provid...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
The growing problem of breaches in information security in recent years has created a demand for ear...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
The growing problem of breaches in information security in recent years has created a demand for ear...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...
Nowadays information security is the highest priority as it is intended to protect information that ...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provid...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
The growing problem of breaches in information security in recent years has created a demand for ear...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
The growing problem of breaches in information security in recent years has created a demand for ear...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...
Nowadays information security is the highest priority as it is intended to protect information that ...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...