메뉴 건너뛰기




Volumn 16, Issue 2, 2008, Pages 144-154

Reconfigurable hardware for high-security/high-performance embedded systems: The SAFES perspective

Author keywords

Cryptography; Hardware monitors; Performance and security policies; Reconfigurable hardware; Secure embedded systems; Security primitive

Indexed keywords

COMPUTER ARCHITECTURE; CRYPTOGRAPHY; EMBEDDED SYSTEMS; SECURITY SYSTEMS; STANDARDS;

EID: 38349167846     PISSN: 10638210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVLSI.2007.912030     Document Type: Article
Times cited : (67)

References (30)
  • 3
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • Oct./Dec
    • D. Dagon, T. Martin, and T. Staner, "Mobile phones as computing devices: The viruses are coming!," IEEE Pervasive Computing, vol. 3, no. 4, pp. 11-15, Oct./Dec. 2004.
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Staner, T.3
  • 8
    • 26444453357 scopus 로고    scopus 로고
    • Security aspects of FPGAs in cryptographic applications
    • T. Wollinger and C. Paar, W. Rosenstiel and P. Lysaght, Eds, Norwell, MA: Kluwer
    • T. Wollinger and C. Paar, , W. Rosenstiel and P. Lysaght, Eds., "Security aspects of FPGAs in cryptographic applications," in New Algorithms, Architectures, and Applications for Reconfigurable Computing. Norwell, MA: Kluwer, 2004.
    • (2004) New Algorithms, Architectures, and Applications for Reconfigurable Computing
  • 10
    • 38349094226 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • E. Suh, J. Lee, S. Devadas, and D. Zhang, "Secure program execution via dynamic information flow tracking," MIT, Boston, Memo-467, 2003.
    • (2003) MIT, Boston, Memo-467
    • Suh, E.1    Lee, J.2    Devadas, S.3    Zhang, D.4
  • 12
    • 3242773027 scopus 로고    scopus 로고
    • High-throughput programmable cryptocoprocessor
    • May/Jun
    • A. Hodjat and I. Verbauwhede, "High-throughput programmable cryptocoprocessor," IEEE Micro, vol. 24, no. 3, pp. 34-45, May/Jun. 2004.
    • (2004) IEEE Micro , vol.24 , Issue.3 , pp. 34-45
    • Hodjat, A.1    Verbauwhede, I.2
  • 13
    • 18844374511 scopus 로고    scopus 로고
    • AES and the cryptonite crypt processor
    • D. Oliva, R. Buchty, and N. Heintze, "AES and the cryptonite crypt processor," in. Proc. CASES, 2003, pp. 198-209.
    • (2003) Proc. CASES , pp. 198-209
    • Oliva, D.1    Buchty, R.2    Heintze, N.3
  • 14
    • 0345382713 scopus 로고    scopus 로고
    • Domain-specific codesign for embedded security
    • Apr
    • P. Schaumont and I. Verbauwhede, "Domain-specific codesign for embedded security," IEEE Computer, vol. 36, no. 4, pp. 68-74, Apr. 2003.
    • (2003) IEEE Computer , vol.36 , Issue.4 , pp. 68-74
    • Schaumont, P.1    Verbauwhede, I.2
  • 15
    • 0035425820 scopus 로고    scopus 로고
    • An FPGA-based performance evaluation of the AES block cipher candidate algorithm, finalists
    • Aug
    • A. J. Elbirt, W. Yip, B. Chetwynd, and C. Paar, "An FPGA-based performance evaluation of the AES block cipher candidate algorithm, finalists," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 9, no. 4, pp. 545-557, Aug. 2001.
    • (2001) IEEE Trans. Very Large Scale Integr. (VLSI) Syst , vol.9 , Issue.4 , pp. 545-557
    • Elbirt, A.J.1    Yip, W.2    Chetwynd, B.3    Paar, C.4
  • 16
    • 26444534119 scopus 로고    scopus 로고
    • An adaptive cryptography engine for internet protocol security architectures
    • Jul
    • A. Dandalis and V. K. Prasanna, "An adaptive cryptography engine for internet protocol security architectures," ACM Trans. Des. Autom. Electron. Syst. (TODAES), vol. 9, no. 3, pp. 333-353, Jul. 2004.
    • (2004) ACM Trans. Des. Autom. Electron. Syst. (TODAES) , vol.9 , Issue.3 , pp. 333-353
    • Dandalis, A.1    Prasanna, V.K.2
  • 20
    • 26444437213 scopus 로고    scopus 로고
    • Configurable computing for high-security/high-performance ambient systems
    • Jul
    • G. Gogniat, W. Burleson, and L. Bossuet, "Configurable computing for high-security/high-performance ambient systems," Lecture Notes Comput. Sci., vol. 3553, pp. 72-81, Jul. 2005.
    • (2005) Lecture Notes Comput. Sci , vol.3553 , pp. 72-81
    • Gogniat, G.1    Burleson, W.2    Bossuet, L.3
  • 23
    • 38349136797 scopus 로고    scopus 로고
    • R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, The RC6 block cipher, Version 1.1 Aug. 20, 1998 [Online, Available
    • R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, "The RC6 block cipher, Version 1.1" Aug. 20, 1998 [Online]. Available: ftp://ftp.rsasecurity.com/pub/rsalabs/rc6/rc6v11.pdf
  • 26
    • 18144370087 scopus 로고    scopus 로고
    • Parity based concurrent error detection for the advanced encryption standard
    • K. Wu, R. Karri, G. Kuznetsov, and M. Goessel, "Parity based concurrent error detection for the advanced encryption standard," in Proc. Int. Test Conf. (ITC), 2004, pp. 1242-1248.
    • (2004) Proc. Int. Test Conf. (ITC) , pp. 1242-1248
    • Wu, K.1    Karri, R.2    Kuznetsov, G.3    Goessel, M.4
  • 30
    • 84856158003 scopus 로고    scopus 로고
    • Power estimation and power measurement of Xilinx virtex FPGAs: Trade-offs and limitations
    • J. Becker, M. Huebner, and M. Ullmann, "Power estimation and power measurement of Xilinx virtex FPGAs: Trade-offs and limitations," in Proc. IEEE Symp. Intregr. Circuits Syst. Des., 2003, pp. 283-288.
    • (2003) Proc. IEEE Symp. Intregr. Circuits Syst. Des , pp. 283-288
    • Becker, J.1    Huebner, M.2    Ullmann, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.