2011 21st International Conference on Field Programmable Logic and Applications 2011
DOI: 10.1109/fpl.2011.99
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Extension for Soft General-Purpose Processors with Secure Key Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…This method is called MAC (MIPS-AES Crypto). The hardware implementation using FPGA provides significant performance gains compared to the software implementation using general purpose processor (microprocessor) in terms of parallel processing, pipelining, word size, and speed [22]. Throughput up to several Gbps can be easily achieved by using FPGA.…”
Section: Mips Based Aes Crypto (Mac)mentioning
confidence: 98%
“…This method is called MAC (MIPS-AES Crypto). The hardware implementation using FPGA provides significant performance gains compared to the software implementation using general purpose processor (microprocessor) in terms of parallel processing, pipelining, word size, and speed [22]. Throughput up to several Gbps can be easily achieved by using FPGA.…”
Section: Mips Based Aes Crypto (Mac)mentioning
confidence: 98%
“…4. The Initial Configuration is based on a MicroBlaze -crypto-coprocessor system presented in [12]. The processor firmware is stored in an instruction memory.…”
Section: B Initial Configuration Structurementioning
confidence: 99%
“…However, these architectures are usually not commercially available or provide only protection against certain attack vectors. Practically realized approaches for secure key storage [9], [10] or against software exploits [11], [12] usually rely on the extension of Field Programmable Gate Array (FPGA) soft-cores or small research processing platforms. On reconfigurable hardware the designer can also exploit security features build in by the FPGA vendor [13], like bitstream encryption.…”
Section: Introductionmentioning
confidence: 99%