International audienceThis paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking Engine), enabling to guarantee the confidentiality and the integrity of data exchanged between a SoC (System on Chip) and its external memory by using an existing block-encryption algorithm. Performance evaluations show that the overhead of security mechanisms in PE-ICE remains low (below 12%) compared to block-encryption-only systems which provide only data confidentiality
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking E...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucc...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
16th International Workshop, PATMOS'06, Montpellier, France, September 13-15 (Proceedings)Internatio...
Securing data in the evermore networked world of today, is a profound necessity that is embraced by ...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
With the ever increasing growth of data communication, hardware encryption technology will become an...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE is a high-speed...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking E...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucc...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
16th International Workshop, PATMOS'06, Montpellier, France, September 13-15 (Proceedings)Internatio...
Securing data in the evermore networked world of today, is a profound necessity that is embraced by ...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
With the ever increasing growth of data communication, hardware encryption technology will become an...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE is a high-speed...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
International audienceOver the last 30 years, a number of secure processor architectures have been p...