When used in cryptographic applications, generalpurpose processors are often completed by a cryptographic accelerator - crypto-coprocessor. Secret keys are usually stored in the internal registers of the processor, and are vulnerable to attacks on protocols, software/firmware or cache memory. The paper presents three ways of extending soft general purpose processors for cryptographic applications. The proposed extension is aimed at symmetric key cryptography and it guarantees secure key management. Three security zones are created and physically separated in each of three configurations: processor, cipher and key storage zones. In the three zones, the secret keys are manipulated in a different manner - in clear or enciphered, as common data...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Modern security devices are facing many constraints. Besides being efficient in terms of speed and a...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
Due to its potential to greatly accelerate a wide variety of applications, reconfigurable computing ...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Modern security devices are facing many constraints. Besides being efficient in terms of speed and a...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
Due to its potential to greatly accelerate a wide variety of applications, reconfigurable computing ...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...