International audienceWhen used in cryptographic applications, general-purpose proces- sors are often extended by a cryptographic accelerator - a crypto- coprocessor. Secret keys are usually stored in the internal registers of the processor, and the cryptographic system is therefore vulnerable to attacks on protocols, or software attacks. We present three ways of extending soft core general purpose proces- sors for cryptographic applications. The proposed extension is aimed at symmetric key cryptography and it guarantees secure key manage- ment. We propose to create three physically isolated security zones: processor, cipher and key storage zone. In the three zones, the secret keys are manipulated in a di erent manner - in clear or encipher...
This work illustrates the research activities related to the implementation of a suite of hardware c...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
Current crypto implementations rely on software running under general-purpose operating systems alon...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Modern security devices are facing many constraints. Besides being efficient in terms of speed and a...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
We propose "secret-protected (SP)" architecture to enable secure and convenient protection...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
This work illustrates the research activities related to the implementation of a suite of hardware c...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
Current crypto implementations rely on software running under general-purpose operating systems alon...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Modern security devices are facing many constraints. Besides being efficient in terms of speed and a...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
We propose "secret-protected (SP)" architecture to enable secure and convenient protection...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
This work illustrates the research activities related to the implementation of a suite of hardware c...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
Current crypto implementations rely on software running under general-purpose operating systems alon...