2014
DOI: 10.1016/j.micpro.2014.03.006
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated encryption on FPGAs from the static part to the reconfigurable part

Abstract: Recently, techniques have been invented to combine encryption and authentication into a single algorithm which is called Authenticated Encryption (AE). Combining these two security services in hardware produces smaller area compared to two separate algorithms. AE is implemented in the static part of the FPGA (FPGA silicon) in order to secure the reconfiguration process to ensure the confidentiality and integrity of the bitstream. Also, it is used in the reconfigurable part of the FPGA to support applications w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Therefore, most of the previous hardware architectures were proposed to support high speed applications. As a result, the pipelined AES was used to perform the encryption task of AES-GCM [4,6,8,9].…”
Section: Hardware Implementationmentioning
confidence: 99%
See 4 more Smart Citations
“…Therefore, most of the previous hardware architectures were proposed to support high speed applications. As a result, the pipelined AES was used to perform the encryption task of AES-GCM [4,6,8,9].…”
Section: Hardware Implementationmentioning
confidence: 99%
“…This design proposed by [5] can be used efficiently (smaller area) on FPGAs as the circuit is specialized for H. We integrated this multiplier proposed by [5] with a key-synthesized AES engine in [6] in order to support slow changing key applications like Virtual Private Networks (VPNs). Also, in [6], we proposed a protocol to secure the FPGA reconfiguration to protect the bitstream because it is a key-based bitsream. The disadvantage of this method is the new reconfiguration which must be downloaded on the FPGA in case of changing the key.…”
Section: Hardware Implementationmentioning
confidence: 99%
See 3 more Smart Citations