International audienceGeneral-purpose processors are not suitable for secure cryptographic key management. Secret keys are usually stored in the internal registers of the processor, and simple attacks on protocols, software/firmware or cache memory can often lead to key disclosure causing a system security failure. The paper presents a novel principle of processor extensions that enable secure key management. This principle is based on the creation and physical separation of three security zones: processor, cipher and key storage. In each of the three zones, the secret keys are manipulated in a different manner - as ordinary data or keys, in clear or encrypted. In order to increase security, the security zones are separated from each other ...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processo...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Modern security devices are facing many constraints. Besides being efficient in terms of speed and a...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Recently, security on programs and data is strongly required in multitask open computer systems such...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpos...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processo...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Modern security devices are facing many constraints. Besides being efficient in terms of speed and a...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Recently, security on programs and data is strongly required in multitask open computer systems such...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpos...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processo...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...