메뉴 건너뛰기




Volumn , Issue , 2008, Pages 438-443

Celator: A multi-algorithm cryptographic co-processor

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; COPROCESSOR; DATA PRIVACY; FIELD PROGRAMMABLE GATE ARRAYS (FPGA); GENERAL PURPOSE COMPUTERS; HARDWARE; HASH FUNCTIONS; RECONFIGURABLE ARCHITECTURES; RECONFIGURABLE HARDWARE; THROUGHPUT;

EID: 62349091083     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ReConFig.2008.76     Document Type: Conference Paper
Times cited : (25)

References (27)
  • 1
    • 0003508560 scopus 로고    scopus 로고
    • Specification for the advanced encryption standard (AES)
    • Federal Information Processing Standards Publication 197, Online, Available
    • "Specification for the advanced encryption standard (AES)," Federal Information Processing Standards Publication 197, 2001. [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
    • (2001)
  • 2
    • 0003508570 scopus 로고    scopus 로고
    • Data encryption standard (DES)
    • Federal Information Processing Standard 46-3, Tech. Rep, Online, Available
    • National Institute of Standards and Technology, "Data encryption standard (DES)," Federal Information Processing Standard 46-3, Tech. Rep., 1999. [Online]. Available: http://csrc.nist.gov/publications/fips/fips46
    • (1999)
  • 3
    • 62349110092 scopus 로고    scopus 로고
    • N. I. of Standards and Technology, Secure hash standard (SHA-2) (+ change notice to include SHA-224), Federal Information Processing Standards Publication 180-2, Standard, Aug. 2002. [Online]. Available: http://csrc.nist.gov/publications/
    • N. I. of Standards and Technology, "Secure hash standard (SHA-2) (+ change notice to include SHA-224)," Federal Information Processing Standards Publication 180-2, Standard, Aug. 2002. [Online]. Available: http://csrc.nist.gov/publications/
  • 4
    • 33847171578 scopus 로고    scopus 로고
    • Securing embedded programmable gate arrays in secure circuits
    • N. Valette, L. Torres, G. Sassatelli, and F. Bancel, "Securing embedded programmable gate arrays in secure circuits," ipdps, vol. 0, p. 226, 2006.
    • (2006) ipdps , vol.0 , pp. 226
    • Valette, N.1    Torres, L.2    Sassatelli, G.3    Bancel, F.4
  • 5
    • 62349094797 scopus 로고    scopus 로고
    • P. Frison, E. Gautrin, D. Lavenier, and J. L. Scharbarg, Réseaux systoliques spécifiques à base du processeur, Institut National de Recherche en Informatique et en Automatique (INRIA), France, Tech. Rep., 1990. [Online]. Available: http://www.inria.fr/
    • P. Frison, E. Gautrin, D. Lavenier, and J. L. Scharbarg, "Réseaux systoliques spécifiques à base du processeur," Institut National de Recherche en Informatique et en Automatique (INRIA), France, Tech. Rep., 1990. [Online]. Available: http://www.inria.fr/
  • 6
    • 62349118588 scopus 로고    scopus 로고
    • System and method for encrypting data,
    • U.S. Patent US2008062803, Online, Available: http://v3.espacenet.com/textdoc?DB=EPODOC&IDX=US2008062803&F=0
    • D. Fronte, A. Perez, and E. Payrat, "System and method for encrypting data," U.S. Patent US2008062803, 2008. [Online]. Available: http://v3.espacenet.com/textdoc?DB=EPODOC&IDX=US2008062803&F=0
    • (2008)
    • Fronte, D.1    Perez, A.2    Payrat, E.3
  • 10
    • 57849097732 scopus 로고    scopus 로고
    • Online, Available
    • Tux the penguin. [Online]. Available: http://upload.wikimedia.org/ wikipedia/commons/a/af/Tux.png
    • Tux the penguin
  • 11
    • 62349134154 scopus 로고    scopus 로고
    • Atmel, AVR processor 8 bits, Tech. Rep., 2006. [Online]. Available: http://www.atmel.com/products/AVR/
    • Atmel, "AVR processor 8 bits," Tech. Rep., 2006. [Online]. Available: http://www.atmel.com/products/AVR/
  • 12
    • 62349110522 scopus 로고    scopus 로고
    • Online, Available
    • (2007) Arm 7 tdmi. [Online]. Available: http://www.arm.com/products/CPUs/ ARM7TDMI.html
    • Arm 7 tdmi
  • 13
    • 62349127018 scopus 로고    scopus 로고
    • embedded core, Online, Available
    • (2007) Arm 9 embedded core. [Online]. Available: http://www.arm.com/ products/CPUs/families/ARM9Family.html
    • , vol.9
  • 14
    • 62349107066 scopus 로고    scopus 로고
    • Atmel Secure Terminals, AT91SO100, Atmel, Tech. Rep., 2007. [Online]. Available: http://www.atmel.com/dyn/products/product-card.asp?part-id= 3810
    • Atmel Secure Terminals, "AT91SO100," Atmel, Tech. Rep., 2007. [Online]. Available: http://www.atmel.com/dyn/products/product-card.asp?part-id= 3810
  • 18
    • 62349124278 scopus 로고    scopus 로고
    • Standard AES cores, Helion standard AES, Helion, Tech. Rep., 2007.[Online]. Available: http://heliontech.com/aes-std.htm
    • Standard AES cores, "Helion standard AES," Helion, Tech. Rep., 2007.[Online]. Available: http://heliontech.com/aes-std.htm
  • 20
    • 0038300424 scopus 로고    scopus 로고
    • Highly regular and scalable AES hardware architecture
    • Online, Available
    • S. Mangard, M. Aigner, and S. Dominikus, "Highly regular and scalable AES hardware architecture," IEEE Transactions on Computers, 2003. [Online]. Available: http://ieeexplore.ieee.org/Xplore/login.jsp?url=/ ie15/10557/33406/01581%498.pdf?arnumber=1581498
    • (2003) IEEE Transactions on Computers
    • Mangard, S.1    Aigner, M.2    Dominikus, S.3
  • 22
    • 62349133256 scopus 로고    scopus 로고
    • Design of an efficient architecture for advanced encryption standard algorithm using systolic structures
    • Online, Available
    • S. Sharma and S. B. Sudarshan, "Design of an efficient architecture for advanced encryption standard algorithm using systolic structures," in International Conference of High Performance Computing (HiPC), 2005. [Online]. Available: http://www.hipc.org/hipc2005/posters/systolic.pdf
    • (2005) International Conference of High Performance Computing (HiPC)
    • Sharma, S.1    Sudarshan, S.B.2
  • 23
    • 33750729555 scopus 로고    scopus 로고
    • R. Chaves, G. Kuzmanov, L. Sousa, and S. Vassiliadis, Improving SHA-2 hardware implementations, in CHES, ser. Lecture Notes in Computer Science, L. Goubin and M. Matsui, Eds., 4249. Springer, 2006, pp. 298-310.
    • R. Chaves, G. Kuzmanov, L. Sousa, and S. Vassiliadis, "Improving SHA-2 hardware implementations," in CHES, ser. Lecture Notes in Computer Science, L. Goubin and M. Matsui, Eds., vol. 4249. Springer, 2006, pp. 298-310.
  • 24
    • 29144532671 scopus 로고    scopus 로고
    • Hardware implementation analysis of SHA-256 and SHA-512 algorithms on fpgas
    • I. Ahmad and A. S. Das, "Hardware implementation analysis of SHA-256 and SHA-512 algorithms on fpgas," Computers & Electrical Engineering, vol. 31, no. 6, pp. 345-360, 2005.
    • (2005) Computers & Electrical Engineering , vol.31 , Issue.6 , pp. 345-360
    • Ahmad, I.1    Das, A.S.2
  • 25
    • 62349122918 scopus 로고    scopus 로고
    • Hashing algorithm generator SHA-256, cadence datasheet
    • "Hashing algorithm generator SHA-256, cadence datasheet."
  • 27
    • 57849146147 scopus 로고    scopus 로고
    • A study of power analysis and the AES (recommendation for designing power analysis resistant attack)
    • George Mason University
    • T. Lash, "A study of power analysis and the AES (recommendation for designing power analysis resistant attack)," in MS Scholarly Paper, George Mason University, 2002.
    • (2002) MS Scholarly Paper
    • Lash, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.