Filters








1,588 Hits in 3.5 sec

Using a high-performance, programmable secure coprocessor [chapter]

Sean W. Smith, Elaine R. Palmer, Steve Weingart
1998 Lecture Notes in Computer Science  
These obstacles motivate building a high-performance secure coprocessor that balances security with easy third-party programmability|but these obstacles also provide many design challenges.  ...  High-performance secure coprocessors can address these threats. However, using this technology for practical security solutions requires overcoming numerous technical and business obstacles.  ...  Suresh Chari, Joan Dyer, Gideon Eisenstadter, Bob Gezelter, Juan Gonzalez, Je Kravitz, Mark Lindemann, Joe McArthur, Dennis Nagel, Ron Perez, Pankaj Rohatgi, David Toll, and Bennet Yee; the IBM Global Security  ... 
doi:10.1007/bfb0055474 fatcat:nf2yri2nr5ddvkdiukzxeh5rma

Architectural design features of a programmable high throughput AES coprocessor

A. Hodjat, P. Schaumont, I. Verbauwhede
2004 International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.  
Programmable, high throughput domain specific crypto processors are required for different networking applications.  ...  This paper presents the architectural design features that lead to a multiple Gbits/s rate AES coprocessor, which is programmable with domain specific instructions for Gbit throughput IPSec and other applications  ...  These techniques help us to design a high-throughput crypto coprocessor, which is programmable with a domain specific instruction set.  ... 
doi:10.1109/itcc.2004.1286703 dblp:conf/itcc/HodjatSV04 fatcat:dshi4k2jqzgwjkwovoy5bimrx4

High-throughput programmable cryptocoprocessor

A. Hodjat, I. Verbauwhede
2004 IEEE Micro  
Combining programmability with high throughput supports a wide range of current and future standards for security applications. A high-speed CPU is one way to implement security primitives.  ...  High-speed Internet Protocol security (IPsec) applications require high throughput and flexible security engines.  ...  Combining programmability with high throughput supports a wide range of current and future standards for security applications. A high-speed CPU is one way to implement security primitives.  ... 
doi:10.1109/mm.2004.11 fatcat:z46xetlq2re65hojayvlm3daoa

A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications

Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
2007 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation  
This paper describes the design of a programmable coprocessor for Public Key Cryptography (PKC) on an FPGA.  ...  This makes the coprocessor very flexible and particularly suitable to be used in embedded environments where the border between hardware and software needs to be decided depending on the application.  ...  When very high performance is required or when a high volume of coprocessors is needed, ASICs are chosen as implementation platforms.  ... 
doi:10.1109/icsamos.2007.4285751 dblp:conf/samos/MentensSBPV07 fatcat:el7kpbazm5artht3626yph7zkq

The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer

T. W. Arnold, L. P. Van Doorn
2004 IBM Journal of Research and Development  
This paper describes the PCIXCC, the new coprocessor introduced in the IBM z990 server. In many ways, PCIXCC is a watershed design.  ...  It offers the performance demanded by today s Web servers, it supports the complex and specialized cryptographic functions needed in the banking and finance industry, and it uses packaging technology that  ...  **Trademark or service mark of Intel Corporation or its subsidiaries, Linus Torvalds, Atmel Corporation, Europay International, MasterCard International Incorporated, Visa International, or SET Secure  ... 
doi:10.1147/rd.483.0475 fatcat:5j64tgvjrfekthkazks22fcxnu

Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security [chapter]

Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede
2009 Lecture Notes in Computer Science  
The programmable design of the coprocessor enables tradeoffs between area, speed, and security.  ...  In this paper, we describe a generic ECC coprocessor architecture, which is scalable and programmable.  ...  The use of PicoBlaze as a new control hierarchy was first proposed in [29] and based on that we in [30] proposed a Dual-PicoBlaze based design to achieve a high instruction rate of 1 instruction per  ... 
doi:10.1007/978-3-642-04138-9_21 fatcat:crj6f5vw55hwrhy6yqu3nznz7u

Towards a hardware-assisted information flow tracking ecosystem for ARM processors

Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, Guy Gogniat
2016 2016 26th International Conference on Field Programmable Logic and Applications (FPL)  
This work details a hardware-assisted approach for information flow tracking implemented on reconfigurable chips.  ...  INTRODUCTION Nowadays, high-technology systems are highly threatened by security issues.  ...  Next steps are to build a full-featured system including a secure DIFT coprocessor. Then, DIFT on both Cortex-A9 cores will be implemented by duplicating DIFT coprocessor and other IPs.  ... 
doi:10.1109/fpl.2016.7577396 dblp:conf/fpl/WahabCAHLG16 fatcat:4e4howgbvbej3hoqmsbtmn64pu

An overview of security issues in cluster interconnects

Manhee Lee, Eun Jung Kim, Ki Hwan Yum, M. Yousif
2006 Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06)  
Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects.  ...  secure coprocessor and the Network Interface Card (NIC) by illustrating its challenges in doing so.  ...  Among several reasons, a high CPU overhead has been a major hurdle for Ethernet to be used in such high performance communication environment.  ... 
doi:10.1109/ccgrid.2006.1630920 fatcat:iyybq4xx6vhrbnpnyit5w3lgmu

Anatomy of a portable digital mediaprocessor

D. Talla, Ching-Yu Hung, R. Talluri, F. Brill, D. Smith, D. Brier, B. Xiong, D. Huynh
2004 IEEE Micro  
Some programmable solutions 1,2 offer competitive performance on several video and audio tasks but lack still-image processing performance and do not integrate a majority of the imaging/video subsystem  ...  A typical GPP's cost runs from the low hundreds to the high hundreds of dollars, while a portable mediaprocessor will likely cost between five and 15 dollars.  ...  Coprocessor subsystem The DM310's high performance and flexibility derive from the DSP core and the programmable coprocessors. The three coprocessors can operate at 144 MHz-twice the DSP clock speed.  ... 
doi:10.1109/mm.2004.1289289 fatcat:tb3sqvtkxnewda5joz754onwdu

Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor

Nele Mentens, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede, Bart Preneel
2006 2006 International Conference on Field Programmable Logic and Applications  
Although this is a very low-cost FPGA, the performance results of our implementation meet the requirements of a broad range of high-end applications.  ...  This paper introduces a secure FPGA implementation of a coprocessor for public key cryptography. It supports Elliptic Curve Cryptography (ECC) as well as the older RSA standard.  ...  For some systems a general purpose microprocessor suffices the requirements, but when high performance is the main criterium, cryptographic coprocessors in hardware are indispensable.  ... 
doi:10.1109/fpl.2006.311205 dblp:conf/fpl/MentensSBVP06 fatcat:fhw4szm75ranpit2mebsiawmmu

A 1.96mm2 low-latency multi-mode crypto-coprocessor for PKC-based IoT security protocols

Cheng-Rung Tsai, Ming-Chun Hsiao, Wen-Chung Shen, An-Yeu Andy Wu, Chen-Mou Cheng
2015 2015 IEEE International Symposium on Circuits and Systems (ISCAS)  
In this paper, we present the implementation of a multi-mode crypto-coprocessor, which can support three different public-key cryptography (PKC) engines (NTRU, TTS, Pairing) used in post-quantum and identity-based  ...  In this work, we propose the first-of-its-kind tri-mode PKC coprocessor for secured data transmission in Internet-of-Things (IoT) systems.  ...  In other words, we use limited resource to achieve remarkable performance improvement. Low Latency and Programmable Crypto-Coprocessor V.  ... 
doi:10.1109/iscas.2015.7168763 dblp:conf/iscas/TsaiHSWC15 fatcat:hvtjfs2d4fbsrhk6lcsghsgp4a

WLAN security processor

N. Smyth, M. McLoone, J.V. McCanny
2006 IEEE Transactions on Circuits and Systems I Fundamental Theory and Applications  
It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator.  ...  A novel wireless local area network (WLAN) security processor is described in this paper.  ...  and high throughput of hardware encryption coprocessors.  ... 
doi:10.1109/tcsi.2006.877888 fatcat:2gvkvjp4izardgdi46evsadr2e

Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor

Hari Kannan, Michael Dalton, Christos Kozyrakis
2009 2009 IEEE/IFIP International Conference on Dependable Systems & Networks  
Using a full-system hardware prototype and realistic Linux workloads, we show that the DIFT coprocessor provides the same security guarantees as current DIFT architectures with low runtime overheads.  ...  The coprocessor is a small hardware engine that performs logical operations and caches 4-bit tags.  ...  This work was supported by an Intel Foundation Graduate Fellowship, a Stanford Graduate Fellowship funded by Sequoia Capital, and NSF awards CCF-0701607 and CCF-0546060.  ... 
doi:10.1109/dsn.2009.5270347 dblp:conf/dsn/KannanDK09 fatcat:ktij6xxfgfbblizczaoaqmsztq

Architectures of flexible symmetric key crypto engines—a survey

Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat
2013 ACM Computing Surveys  
In particular, key management security (e.g., secure key generation and transmission, the use of a hierarchical key structure composed of session keys and master keys) has frequently been neglected to  ...  the benefit of performance and/or flexibility.  ...  Based on the single AES-THETIC coprocessor [Su et al. 2005 ] the authors propose a high-performance multicore architecture, in which independent data paths for each AESTHETIC coprocessor allow multigigabit  ... 
doi:10.1145/2501654.2501655 fatcat:h5pccigb35hfvinkrpn7s75gl4

Platform-based design for an embedded-fingerprint-authentication device

P. Schaumont, D. Hwang, I. Verbauwhede
2005 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
The formulation of a platform as a VM enables design exploration and incremental design validation throughout the design traject, and results in a specialized, but still programmable, platform.  ...  an field programmable gate array.  ...  The use of hardware encryption is done not only for performance, but also for reasons of security.  ... 
doi:10.1109/tcad.2005.853709 fatcat:vzvdcwfiv5givjupbct2pmq5cq
« Previous Showing results 1 — 15 out of 1,588 results