2008 International Conference on Reconfigurable Computing and FPGAs 2008
DOI: 10.1109/reconfig.2008.59
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing an Embedded Processor Core with a Cryptographic Unit for Speed and Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 5 publications
0
17
0
Order By: Relevance
“…RSA with 2048 bits has been confirm to consume higher energy and therefore unsuitable for WSN applications and embedded system (Amin et al, 2008a). Moreover, RSA when implemented in hardware demand large silicon area and therefore increase the size of the chip (Kocabas et al, 2008b). An alternative to RSA is Elliptic Curve Cryptography (ECC) and Advance Encryption System (AES).…”
Section: Fig 2 Standard Tpm Componentsmentioning
confidence: 99%
See 1 more Smart Citation
“…RSA with 2048 bits has been confirm to consume higher energy and therefore unsuitable for WSN applications and embedded system (Amin et al, 2008a). Moreover, RSA when implemented in hardware demand large silicon area and therefore increase the size of the chip (Kocabas et al, 2008b). An alternative to RSA is Elliptic Curve Cryptography (ECC) and Advance Encryption System (AES).…”
Section: Fig 2 Standard Tpm Componentsmentioning
confidence: 99%
“…1, are achievable through PKC implementation supporting asymmetric key management as well as authenticity and integrity. Although the use of PKC in WSN is previously denied due to its high resourced (energy, memory and computational) (Yong et al, 2006), many recent works have proved its feasibility in the WSN area (Kocabas et al, 2008b). Latest, Wen Hu (Hu et al, 2009) used Trusted Platform Module hardware which is based on Public Key (PK) platform to augment the security of the sensor node.…”
mentioning
confidence: 99%
“…The implementation of instructions for efficient integer and logic operations have been explained earlier in our earlier work [13]. Therefore, we focus only on explaining new instructions that allow secure execution of cryptographic operations; but only a couple of instructions, which we think are the most representative of the adopted methodology, are explained for space considerations.…”
Section: The New Instruction Set Architecturementioning
confidence: 99%
“…In our earlier work appeared in the poster session of Reconfig'08 [22], we proposed a cryptographic unit (CU) that accelerates cryptographic algorithms such as RSA, elliptic curve cryptography (ECC) and AES. It has been shown that the proposed CU can easily be integrated to any RISC processor including the embedded end of the processor spectrum.…”
Section: Related Work and Our Contributionmentioning
confidence: 99%
“…In this paper, we explore the benefits of a cryptographic unit (CU) in the context of isolated execution of cryptographic algorithms, a preliminary prototype of which has originally been proposed for secure and efficient implementation of cryptographic algorithms [22]. The cryptographic unit (CU) is relatively low cost executional unit that can be integrated to many RISC-style processors.…”
Section: Introductionmentioning
confidence: 99%