Proceedings of the 2nd International Conference on Security of Information and Networks - SIN '09 2009
DOI: 10.1145/1626195.1626233
|View full text |Cite
|
Sign up to set email alerts
|

Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit

Abstract: Cryptographic algorithms handle sensitive information and their safe execution plays an essential role in many security applications. When implemented in software on generalpurpose computers, cryptographic algorithms are vulnerable to a variety of attacks such as side-channel and cold-boot attacks since they either share hardware resources with other simultaneously executing processes or store sensitive information in easily accessible places (e.g. main memory). In this paper, we demonstrate that secure and is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Any data that goes out of the chip Other architectures modify or extend processor cores mostly for accelerating the cryptographic algorithms [23], [24]. There are also other architectures, which propose solutions for both secure and fast execution of cryptographic algorithms [19], [21], [1] and [20]. A recent work in [24] explores design possibilities for accelerating cryptographic algorithms while secure execution is not considered.…”
Section: Related Work and Our Contributionmentioning
confidence: 99%
See 3 more Smart Citations
“…Any data that goes out of the chip Other architectures modify or extend processor cores mostly for accelerating the cryptographic algorithms [23], [24]. There are also other architectures, which propose solutions for both secure and fast execution of cryptographic algorithms [19], [21], [1] and [20]. A recent work in [24] explores design possibilities for accelerating cryptographic algorithms while secure execution is not considered.…”
Section: Related Work and Our Contributionmentioning
confidence: 99%
“…To accelerate the basic arithmetic operations in fields with prime characteristics, we use the functional units presented in [20,21]. Table 6, we present the timing results for the prime extension field arithmetic used in pairing-based cryptography.…”
Section: Modular Arithmetic Operations For Big Numbersmentioning
confidence: 99%
See 2 more Smart Citations
“…We also demonstrate that well-know cryptographic algorithms, RSA, ECC, AES can be implemented on embedded processor equipped with the protected zone with superior time performance, efficiency, and high-level security. A similar approach is used in [21] only for AES implementation; however the proposed techniquein [21] cannot easily be extended to more complicated public key algorithms. We provide a complete, generic approach that is readily applicable to any cryptographic algorithm and does not necessitate Assembly language implementation which is essential in [21].…”
Section: Introductionmentioning
confidence: 99%