A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and implemented. The processor is mainly aimed for IPSec applications, which require intense processing power for cryptographic operations. In the present design, this processing power is achieved via the custom cryptographic coprocessors. These are an AES engine, a SHA-1 engine and a Montgomery modular multiplier, which are connected to the main processor core through a generic flexible interface. The processor core is fully compatible with Zylin Processor Unit (ZPU) instruction set, allowing the use of ZPU toolchain. A minimum set of required instructions is implemented in hardware, while the rest of the instructions are emulated in software. T...
Abstract—This paper describes the design of a programmable coprocessor for Public Key Cryptography (...
Cryptographic accelerators and security processors are often used in embedded systems in order to en...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
In this paper a high-speed cryptographic co-processor, named HSSec, is presented. The core embeds tw...
The growing problem of breaches in information security in recent years has created a demand for ear...
The growing problem of breaches in information security in recent years has created a demand for ear...
Abstract—In this paper, a lightweight processor suitable for lightweight cryptographic applications ...
This thesis study presents design and SystemC implementation of a Crypto Processor for Advanced Encr...
This work illustrates the research activities related to the implementation of a suite of hardware c...
The key requirements of High-speed Internet Protocol security (IPsec) applications are high throughp...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
This paper presents the implementation of hash functions for IPSEC chip. There is an increasing inte...
We propose a cryptographic accelerator for IPsec by using the NEC electronics ’ Dynamically Reconfig...
87 p. : ill. ; 30 cmThis work consists to implement IP cores dedicated to cryptography, using an FPG...
With today's great demand for secure communications systems, there is a growing demand for real-time...
Abstract—This paper describes the design of a programmable coprocessor for Public Key Cryptography (...
Cryptographic accelerators and security processors are often used in embedded systems in order to en...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
In this paper a high-speed cryptographic co-processor, named HSSec, is presented. The core embeds tw...
The growing problem of breaches in information security in recent years has created a demand for ear...
The growing problem of breaches in information security in recent years has created a demand for ear...
Abstract—In this paper, a lightweight processor suitable for lightweight cryptographic applications ...
This thesis study presents design and SystemC implementation of a Crypto Processor for Advanced Encr...
This work illustrates the research activities related to the implementation of a suite of hardware c...
The key requirements of High-speed Internet Protocol security (IPsec) applications are high throughp...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
This paper presents the implementation of hash functions for IPSEC chip. There is an increasing inte...
We propose a cryptographic accelerator for IPsec by using the NEC electronics ’ Dynamically Reconfig...
87 p. : ill. ; 30 cmThis work consists to implement IP cores dedicated to cryptography, using an FPG...
With today's great demand for secure communications systems, there is a growing demand for real-time...
Abstract—This paper describes the design of a programmable coprocessor for Public Key Cryptography (...
Cryptographic accelerators and security processors are often used in embedded systems in order to en...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...