Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel structures implementing computationally extensive cryptographic functions must co-exist with complex sequential structures used to implement cryptographic algorithms such as cipher modes, key management operations and cryptographic protocols. Implementation of algorithms with sequential character necessitates employing many complex state machines that make the logic very instable and vulnerable. Most common solution consists of the use of a general-purpose processor with cryptographic co-processor. However, this solution brings some difficulties concerning the system security: first, the general-purpose processor manipulates the keys as ordi...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...