Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding market is now oriented towards more exibility. In this thesis we propose as novel solution a Multi-algorithm Cryptographic Co-processor called Celator. Celator is able to encrypt or decrypt data blocks using private key encryption algorithms such as Advanced Encryption Standard (AES) [1] or Data Encryption Standard (DES) [2]. Moreover Celator allows condensing data using the Secure Hash Algorithms (SHA) [3]. These algorithms are frequently implemented in hi-tech secure products in software or in hardware mode. Celator belongs to the class of the exible hardware implementations, and allows an user implementing its own cryptographic algorithm ...
The research presented in this Thesis focuses on efficient implementation of cryptographic hardware ...
Cryptographic algorithm agility, i.e., the capability to switch between several encryption algorithm...
International audienceThis paper presents a multi-core architecture for cryptographic processors. Th...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
In this paper a high-speed cryptographic co-processor, named HSSec, is presented. The core embeds tw...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
In todays networks security is becoming more and more important. Public Key Cryptography, which is a...
textIn cryptographic processor design, the selection of functional primitives and connection structu...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
This research was performed to evaluate the cryptographic capabilities of the Chameleon CS2112 Recon...
The research presented in this Thesis focuses on efficient implementation of cryptographic hardware ...
Cryptographic algorithm agility, i.e., the capability to switch between several encryption algorithm...
International audienceThis paper presents a multi-core architecture for cryptographic processors. Th...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
In this paper a high-speed cryptographic co-processor, named HSSec, is presented. The core embeds tw...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
In todays networks security is becoming more and more important. Public Key Cryptography, which is a...
textIn cryptographic processor design, the selection of functional primitives and connection structu...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
This research was performed to evaluate the cryptographic capabilities of the Chameleon CS2112 Recon...
The research presented in this Thesis focuses on efficient implementation of cryptographic hardware ...
Cryptographic algorithm agility, i.e., the capability to switch between several encryption algorithm...
International audienceThis paper presents a multi-core architecture for cryptographic processors. Th...