Handbook of Applied Cryptography
Handbook of Applied Cryptography
Custom Memory Management Methodology: Exploration of Memory Organisation for Embedded Multimedia System Design
Security at the Internet Layer
Computer
ISC '01 Proceedings of the 4th International Conference on Information Security
AEGIS: architecture for tamper-evident and tamper-resistant processing
ICS '03 Proceedings of the 17th annual international conference on Supercomputing
Efficient Memory Integrity Verification and Encryption for Secure Processors
Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture
Memory predecryption: hiding the latency overhead of memory encryption
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Proceedings of the conference on Design, automation and test in Europe
Supporting flexible streaming media protection through privacy-aware secure processors
Computers and Electrical Engineering
HiPAcc-LTE: an integrated high performance accelerator for 3GPP LTE stream ciphers
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Hi-index | 0.00 |
This contribution describes the design and performance testing of an Advanced Encryption Standard (AES) compliant encryption chip that delivers 2.29 GB/s of encryption throughput at 56 mw of power consumption. We discuss how the high level reference specification in C is translated into a parallel architecture. Design decisions are motivated from a system level viewpoint. The prototyping setup is discussed.