International audienceUsing dedicated hardware is common practice in order to accelerate cryptographic operations: complex operations are managed by a dedicated co-processor and RAM/crypto-engine data transfers are fully managed by DMA operations. The CPU is therefore free for other tasks, which is vital in embedded environments with limited CPU power. In this work we discuss and benchmark XTS-AES, using either software or mixed approaches, using Linux and dm-crypt, and a low-power At-mel(tm) board. This board featurs an AES crypto-engine that supports ECB-AES but not the XTS-AES mode. We show that the dm-crypt module used in Linux for full disk encryption has limitations that can be relaxed when considering larger block sizes. In particula...
Cryptographic algorithms, like the Advanced Encryption Standard, are frequently used in todays elect...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
Securing data stored inside the storage devices is becoming an important concern in computer securit...
Long version of the SECRYPT 2020 accepted articleInternational audienceLinux implementation of Full ...
Disk encryption has changed during the last decade from being a mechanism only used by corporate exe...
Storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now w...
International audienceWith the advance of autonomous systems, security is becoming the most crucial ...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
This Thesis will analyze the standard 1619.1 published by the IEEE. The aim of this standard is to p...
Abstract- Encryption is becoming an increasingly dominant component in online and mobile application...
Cryptography is the study of mathematical techniques related to aspects of information security such...
This thesis compares the impact on disk performance in a GNU/Linux environmentwith three encryption...
The advent of the digital communication has led cryptography into becoming an important agent in pro...
Abstract. Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAES...
Cryptographic algorithms, like the Advanced Encryption Standard, are frequently used in todays elect...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
Securing data stored inside the storage devices is becoming an important concern in computer securit...
Long version of the SECRYPT 2020 accepted articleInternational audienceLinux implementation of Full ...
Disk encryption has changed during the last decade from being a mechanism only used by corporate exe...
Storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now w...
International audienceWith the advance of autonomous systems, security is becoming the most crucial ...
This article presents a cryptographic hardware (HW) accelerator supporting multiple advanced encrypt...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
This Thesis will analyze the standard 1619.1 published by the IEEE. The aim of this standard is to p...
Abstract- Encryption is becoming an increasingly dominant component in online and mobile application...
Cryptography is the study of mathematical techniques related to aspects of information security such...
This thesis compares the impact on disk performance in a GNU/Linux environmentwith three encryption...
The advent of the digital communication has led cryptography into becoming an important agent in pro...
Abstract. Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAES...
Cryptographic algorithms, like the Advanced Encryption Standard, are frequently used in todays elect...
This paper focuses on the performance of cryptographic algorithms on modern par-allel computers. I b...
Securing data stored inside the storage devices is becoming an important concern in computer securit...