In this paper a high-speed cryptographic co-processor, named HSSec, is presented. The core embeds two hash functions, SHA-1 and SHA-512, and the symmetric block cipher AES. The architecture of HSSec renders it suitable for widely spread applications with security demands. The presented co-processor can be used inevery system integrating standards such as IPSec or the upcoming JPSec and P1619. The main characteristic of the proposed implementation is common use of the available resources, to minimize further area requirements. Additionally the cryptographic primitives can operate in parallel, providing high throughput whenever needed. Finally the system can operate in ECB or CBC modes. The HSSec co-processor has relatively small area and its...
[[abstract]]As networking technology advances, the gap between network bandwidth and network process...
The Advanced Encryption Standard (AES) has added new dimension to cryptography with its potentials o...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
This paper presents the implementation of hash functions for IPSEC chip. There is an increasing inte...
A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and ...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
[[abstract]]We propose a configurable AES processor for extended-security communication. The propose...
We consider the AES encryption/decryption algorithm and propose a memory based hardware design to su...
The growing problem of breaches in information security in recent years has created a demand for ear...
The growing problem of breaches in information security in recent years has created a demand for ear...
In todays networks security is becoming more and more important. Public Key Cryptography, which is a...
The key requirements of High-speed Internet Protocol security (IPsec) applications are high throughp...
Abstract:- The Advanced Encryption Standard (AES) is used nowadays extensively in many network and m...
This paper describes an efficient hardware realization of the Advanced Encryption Standard (AES) alg...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
[[abstract]]As networking technology advances, the gap between network bandwidth and network process...
The Advanced Encryption Standard (AES) has added new dimension to cryptography with its potentials o...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
This paper presents the implementation of hash functions for IPSEC chip. There is an increasing inte...
A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and ...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...
[[abstract]]We propose a configurable AES processor for extended-security communication. The propose...
We consider the AES encryption/decryption algorithm and propose a memory based hardware design to su...
The growing problem of breaches in information security in recent years has created a demand for ear...
The growing problem of breaches in information security in recent years has created a demand for ear...
In todays networks security is becoming more and more important. Public Key Cryptography, which is a...
The key requirements of High-speed Internet Protocol security (IPsec) applications are high throughp...
Abstract:- The Advanced Encryption Standard (AES) is used nowadays extensively in many network and m...
This paper describes an efficient hardware realization of the Advanced Encryption Standard (AES) alg...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
[[abstract]]As networking technology advances, the gap between network bandwidth and network process...
The Advanced Encryption Standard (AES) has added new dimension to cryptography with its potentials o...
Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding...