It is clear that Cryptography is computationally intensive. It is also known that embedded systems have slow clock rates and less memory. The idea for this thesis was to study the possibilities for analysis of cryptography on embedded systems. The basic approach was the implementation of cryptographic algorithms on high-end, state-of-the-art, DSP chips in order to study the various parameters that optimize the performance of the chip while keeping the overhead of encryption and decryption to a minimum. Embedded systems are very resource sensitive. An embedded system is composed of different components, which are implemented in both hardware and software. Therefore, hardware-software co-synthesis is a crucial factor affecting the performance...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
In this paper, we study the runtime performance of symmetric cryptographic algorithms on an embedded...
Abstract. As computing becomes pervasive, embedded systems are deployed in a wide range of domains, ...
It is clear that Cryptography is computationally intensive. It is also known that embedded systems h...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Conselho Nacional de Desenvolvime...
In the field of embedded systems design, coprocessors play an important role as a component to incre...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
This report is part of a follow-up of a project completed in 2015 that involved memory authenticati...
In general, cryptographic methods are very intensive on memory and computing power. The reason for t...
Nowadays, we use embedded electronic devices in almost every aspect of our daily lives. They represe...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems...
We present a body of work aimed at understanding and improving the security posture of embedded devi...
Security mechanisms to protect our systems and data from malicious adversaries have become essential...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
In this paper, we study the runtime performance of symmetric cryptographic algorithms on an embedded...
Abstract. As computing becomes pervasive, embedded systems are deployed in a wide range of domains, ...
It is clear that Cryptography is computationally intensive. It is also known that embedded systems h...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Conselho Nacional de Desenvolvime...
In the field of embedded systems design, coprocessors play an important role as a component to incre...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
This report is part of a follow-up of a project completed in 2015 that involved memory authenticati...
In general, cryptographic methods are very intensive on memory and computing power. The reason for t...
Nowadays, we use embedded electronic devices in almost every aspect of our daily lives. They represe...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems...
We present a body of work aimed at understanding and improving the security posture of embedded devi...
Security mechanisms to protect our systems and data from malicious adversaries have become essential...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
In this paper, we study the runtime performance of symmetric cryptographic algorithms on an embedded...
Abstract. As computing becomes pervasive, embedded systems are deployed in a wide range of domains, ...