International audienceReconfigurable architectures are being increasingly widely used thanks to their high flexibility. This flexibilityis due to their inherent ability to reconfigure (whether dynamically or not) functional blocks. Manyconfigurations can be used and changed while the application is running in the reconfigurable system,and/or the same configuration can be used by several systems at different times. The flexibility of reconfigurablesystems is greatly enhanced if they can be reconfigured remotely. But in the case of remotereconfiguration, security is of paramount importance. In this article, the problem of remote configurationis addressed by the concept of disposable configuration, an efficient, secure and reliable mechanism f...
Abstract—Embedded systems present significant security chal-lenges due to their limited resources an...
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but a...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
International audienceReconfigurable architectures are being increasingly widely used thanks to thei...
This paper presents a solution for secure remote reconfiguration of FPGAs. Communicating the bitstre...
With reconfigurable devices fast becoming complete systems in their own right, interest in their sec...
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provid...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Computing systems designed using reconfigurable hardware are now used in many sensitive applications...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
With the new and powerful Field Programmable Gate Array (FPGA) families, new possibilities have been...
Abstract — Embedded systems present significant security chal-lenges due to their limited resources,...
Transferring the data more securely plays a vital role in today’s communication world. Ensuring that...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
Abstract—Embedded systems present significant security chal-lenges due to their limited resources an...
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but a...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
International audienceReconfigurable architectures are being increasingly widely used thanks to thei...
This paper presents a solution for secure remote reconfiguration of FPGAs. Communicating the bitstre...
With reconfigurable devices fast becoming complete systems in their own right, interest in their sec...
This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provid...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Computing systems designed using reconfigurable hardware are now used in many sensitive applications...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
With the new and powerful Field Programmable Gate Array (FPGA) families, new possibilities have been...
Abstract — Embedded systems present significant security chal-lenges due to their limited resources,...
Transferring the data more securely plays a vital role in today’s communication world. Ensuring that...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
International audienceThis work presents reconfigurable processor aimed at symmetric-key cryptograph...
Abstract—Embedded systems present significant security chal-lenges due to their limited resources an...
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but a...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...