International audienceWith the advance of autonomous systems, security is becoming the most crucial feature in different domains, highlighting the need for protection against potential attacks. Mitigation of these types of attacks can be achieved using embedded cryptography algorithms, which differ in performance, area, and reliability. This paper compares hardware implementations of the eXtended Tiny Encryption Algorithm (XTEA) and the Advanced Encryption Standard (AES) algorithms. Results show that the XTEA implementation gives the best relative performance (e.g., throughput, power), area, and soft error reliability trade-offs.</p
Key size of an algorithm is an important aspect of cryptographic technique as high key bits is consi...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
International audienceUsing dedicated hardware is common practice in order to accelerate cryptograph...
With the advance of autonomous systems, security is becoming the most crucial feature in different d...
The development of extremely-constrained embedded systems having sensitive nodes such as RFID tags a...
The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware ...
Embedded hardware security has been an increasingly important need for many modern general and speci...
Most safety-critical edge-computing devices rely on lightweight cryptography (LWC) algorithms to pro...
Abstract- In this age of viruses and hackers of electronic eavesdropping and electronic fraud, secur...
Encryption algorithms play a dominant role in preventing unauthorized access to important data. This...
With the current fast paced growth in the number of devices connected to the internet, many of these...
The technical analysis used in determining which ofthe potential Advanced Encryption Standard candid...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
The main objective of this article is to implement a hardware-software prototype for sending and rec...
Key size of an algorithm is an important aspect of cryptographic technique as high key bits is consi...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
International audienceUsing dedicated hardware is common practice in order to accelerate cryptograph...
With the advance of autonomous systems, security is becoming the most crucial feature in different d...
The development of extremely-constrained embedded systems having sensitive nodes such as RFID tags a...
The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware ...
Embedded hardware security has been an increasingly important need for many modern general and speci...
Most safety-critical edge-computing devices rely on lightweight cryptography (LWC) algorithms to pro...
Abstract- In this age of viruses and hackers of electronic eavesdropping and electronic fraud, secur...
Encryption algorithms play a dominant role in preventing unauthorized access to important data. This...
With the current fast paced growth in the number of devices connected to the internet, many of these...
The technical analysis used in determining which ofthe potential Advanced Encryption Standard candid...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
The main objective of this article is to implement a hardware-software prototype for sending and rec...
Key size of an algorithm is an important aspect of cryptographic technique as high key bits is consi...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
International audienceUsing dedicated hardware is common practice in order to accelerate cryptograph...