Advanced

Snow 2.0 IP core for trusted hardware

Fang, Wen Hai LU ; Johansson, Thomas LU and Spaanenburg, Lambert LU (2005) 2005 International Conference on Field Programmable Logic and Applications (FPL) In Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL 2005. p.281-286
Abstract
Stream ciphers like Snow 2.0 are very promising techniques for encryption in trusted hardware, but demand specialized IP cores to enhance conventional architectures. The paper describes the design of such a core that can be adapted to the system needs according to a ratio of throughput and effective slice usage of 3.2 to 3.5. The footprint is comparable with a commercial floating-point unit.
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
Behavioral Synthesis, Trusted Hardware, ISA-compliant IP-core, Stream cipher encryption, Pareto curve
in
Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL
volume
2005
pages
281 - 286
publisher
IEEE--Institute of Electrical and Electronics Engineers Inc.
conference name
2005 International Conference on Field Programmable Logic and Applications (FPL)
external identifiers
  • Scopus:33746933258
DOI
10.1109/FPL.2005.1515735
language
English
LU publication?
yes
id
99e9fc4a-362c-4cf9-9f2a-748b435ba0dd (old id 616438)
date added to LUP
2007-11-25 10:14:19
date last changed
2016-10-13 04:46:05
@misc{99e9fc4a-362c-4cf9-9f2a-748b435ba0dd,
  abstract     = {Stream ciphers like Snow 2.0 are very promising techniques for encryption in trusted hardware, but demand specialized IP cores to enhance conventional architectures. The paper describes the design of such a core that can be adapted to the system needs according to a ratio of throughput and effective slice usage of 3.2 to 3.5. The footprint is comparable with a commercial floating-point unit.},
  author       = {Fang, Wen Hai and Johansson, Thomas and Spaanenburg, Lambert},
  keyword      = {Behavioral Synthesis,Trusted Hardware,ISA-compliant IP-core,Stream cipher encryption,Pareto curve},
  language     = {eng},
  pages        = {281--286},
  publisher    = {ARRAY(0xac30548)},
  series       = {Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL},
  title        = {Snow 2.0 IP core for trusted hardware},
  url          = {http://dx.doi.org/10.1109/FPL.2005.1515735},
  volume       = {2005},
  year         = {2005},
}