International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptographic applications. Its architecture is optimized for implementation of common cryptography tasks. The processor has 128-bit separated data and key registers, dedicated instruction set optimized for key generation and management, embedded cipher, and embedded random number generator. From an architectural point of view, the most important characteristic of the proposed crypto-processor is the physical separation of data and key registers and buses, insuring that confidential keys will never leave the system in clear. This way, the processor enables to separate protected and unprotected security zones easily and also achieve complete physical...
Transferring the data more securely plays a vital role in today’s communication world. Ensuring that...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
The growing problem of breaches in information security in recent years has created a demand for ear...
The last 30 years have seen an increase in the complexity of embedded systems from a collection of s...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
International audienceReconfigurable architectures are being increasingly widely used thanks to thei...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
Transferring the data more securely plays a vital role in today’s communication world. Ensuring that...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
The growing problem of breaches in information security in recent years has created a demand for ear...
The last 30 years have seen an increase in the complexity of embedded systems from a collection of s...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
International audienceReconfigurable architectures are being increasingly widely used thanks to thei...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
Transferring the data more securely plays a vital role in today’s communication world. Ensuring that...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...