Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding market is now oriented towards more exibility. In this thesis we propose as novel solution a Multi-algorithm Cryptographic Co-processor called Celator. Celator is able to encrypt or decrypt data blocks using private key encryption algorithms such as Advanced Encryption Standard (AES) or Data Encryption Standard (DES) . Moreover Celator allows condensing data using the Secure Hash Algorithms (SHA). These algorithms are frequently implemented in hi-tech secure products in software or in hardware mode. Celator belongs to the class of the exible hardware implementations, and allows an user implementing its own cryptographic algorithm under speci...
This thesis study presents design and SystemC implementation of a Crypto Processor for Advanced Encr...
A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and ...
Le présent travail porte sur la modélisation et l’implémentation un crypto-processeur reconfigurable...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
textIn cryptographic processor design, the selection of functional primitives and connection structu...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
In this paper a high-speed cryptographic co-processor, named HSSec, is presented. The core embeds tw...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
This thesis study presents design and SystemC implementation of a Crypto Processor for Advanced Encr...
A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and ...
Le présent travail porte sur la modélisation et l’implémentation un crypto-processeur reconfigurable...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
textIn cryptographic processor design, the selection of functional primitives and connection structu...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
In this paper a high-speed cryptographic co-processor, named HSSec, is presented. The core embeds tw...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
This thesis study presents design and SystemC implementation of a Crypto Processor for Advanced Encr...
A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and ...
Le présent travail porte sur la modélisation et l’implémentation un crypto-processeur reconfigurable...