2012
DOI: 10.1002/sec.555
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of a versatile cryptographic unit for RISC processors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…This way, a wider range of public key algorithms based on modular arithmetic can be protected against fault attacks. The cost of integrating non-linear arithmetic error-correcting codes in embedded processors is evaluated in [57,60]. Detecting capability and design choices of the error correcting codes against an intelligent and powerful attacker are discussed in detail in [59].…”
Section: Feasibility Of Fault Attacks and Countermeasuresmentioning
confidence: 99%
“…This way, a wider range of public key algorithms based on modular arithmetic can be protected against fault attacks. The cost of integrating non-linear arithmetic error-correcting codes in embedded processors is evaluated in [57,60]. Detecting capability and design choices of the error correcting codes against an intelligent and powerful attacker are discussed in detail in [59].…”
Section: Feasibility Of Fault Attacks and Countermeasuresmentioning
confidence: 99%
“…Any data that goes out of the chip Other architectures modify or extend processor cores mostly for accelerating the cryptographic algorithms [23], [24]. There are also other architectures, which propose solutions for both secure and fast execution of cryptographic algorithms [19], [21], [1] and [20]. A recent work in [24] explores design possibilities for accelerating cryptographic algorithms while secure execution is not considered.…”
Section: Related Work and Our Contributionmentioning
confidence: 99%
“…The implementation of instructions for efficient integer and logic operations has been explained in detail in our previous works [19,20]. Therefore, we focus only on explaining the new instructions that allow secure execution of cryptographic operations; but only a subset of new instructions, which we think are the most representative of the adopted methodology, is explained for space considerations.…”
Section: The New Instruction Set Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…This method reduces the time consumption of round function significantly and is the fastest non-parallelised software implementation which has been adopted by many security systems like OpenSSL (Viega et al, 2002). Moreover, the LUT-based AES software implementations are more applicable than the ones based on hardware accelerators (Rahimunnisa et al, 2014;Abdellatif et al, 2014;Chang et al, 2013;Swankoski et al, 2005) or the ones based on instruction set extension (Rott, 2012;Lee and Chen, 2010;Yumbul et al, 2014) due to its' hardware-independency characteristic.…”
Section: Introductionmentioning
confidence: 99%