The research presented in this thesis focuses on the design of a flexible cryptographic hardware module capable of implementing a variety of private-key cryptographic algorithms and their modes of operation using different implementation methodologies such as iteration and pipelining. The design of the SHERIF cryptographic hardware module was motivated by the difficulties inherent in implementing cryptographic algorithms: software implementation is easy and flexible, but offers low performance, whereas hardware implementations offer high performance but are difficult to design and are generally inflexible. -- The design of the SHERIF architecture was driven by an analysis of several leading block ciphers and hash functions which identified ...
textIn cryptographic processor design, the selection of functional primitives and connection structu...
This paper reports on the main research results achieved by the author, including activities carried...
The purpose of the research is to investigate the emerging data security methodologies that will wor...
This research was performed to evaluate the cryptographic capabilities of the Chameleon CS2112 Recon...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
PhD ThesisThe field programmable gate array (FPGA) is a powerful technology, and since its introduct...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
Due to the ubiquity of electronic communication systems in consumers\u27 lives, it is necessary to e...
As the amount of information exchanged through the network grows, so does the demand for increased s...
As the world is getting closer to the paradigm of Internet of Things, ensuring security for all the ...
The software implementations of cryptographic algorithms are considered to be very slow, when there ...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
textIn cryptographic processor design, the selection of functional primitives and connection structu...
This paper reports on the main research results achieved by the author, including activities carried...
The purpose of the research is to investigate the emerging data security methodologies that will wor...
This research was performed to evaluate the cryptographic capabilities of the Chameleon CS2112 Recon...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
PhD ThesisThe field programmable gate array (FPGA) is a powerful technology, and since its introduct...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
A considerable amount of recent research has focused on hardware implementations of cryptographic al...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
Due to the ubiquity of electronic communication systems in consumers\u27 lives, it is necessary to e...
As the amount of information exchanged through the network grows, so does the demand for increased s...
As the world is getting closer to the paradigm of Internet of Things, ensuring security for all the ...
The software implementations of cryptographic algorithms are considered to be very slow, when there ...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
textIn cryptographic processor design, the selection of functional primitives and connection structu...
This paper reports on the main research results achieved by the author, including activities carried...
The purpose of the research is to investigate the emerging data security methodologies that will wor...