Snow 2.0 IP core for trusted hardware
(2005) 2005 International Conference on Field Programmable Logic and Applications (FPL) 2005. p.281-286- Abstract
- Stream ciphers like Snow 2.0 are very promising techniques for encryption in trusted hardware, but demand specialized IP cores to enhance conventional architectures. The paper describes the design of such a core that can be adapted to the system needs according to a ratio of throughput and effective slice usage of 3.2 to 3.5. The footprint is comparable with a commercial floating-point unit.
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/616438
- author
- Fang, Wen Hai LU ; Johansson, Thomas LU and Spaanenburg, Lambert LU
- organization
- publishing date
- 2005
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- keywords
- Behavioral Synthesis, Trusted Hardware, ISA-compliant IP-core, Stream cipher encryption, Pareto curve
- host publication
- Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL
- volume
- 2005
- pages
- 281 - 286
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- conference name
- 2005 International Conference on Field Programmable Logic and Applications (FPL)
- conference location
- Tampere, Finland
- conference dates
- 2005-08-24 - 2005-08-26
- external identifiers
-
- scopus:33746933258
- DOI
- 10.1109/FPL.2005.1515735
- language
- English
- LU publication?
- yes
- id
- 99e9fc4a-362c-4cf9-9f2a-748b435ba0dd (old id 616438)
- date added to LUP
- 2016-04-04 11:29:55
- date last changed
- 2023-09-20 11:11:09
@inproceedings{99e9fc4a-362c-4cf9-9f2a-748b435ba0dd, abstract = {{Stream ciphers like Snow 2.0 are very promising techniques for encryption in trusted hardware, but demand specialized IP cores to enhance conventional architectures. The paper describes the design of such a core that can be adapted to the system needs according to a ratio of throughput and effective slice usage of 3.2 to 3.5. The footprint is comparable with a commercial floating-point unit.}}, author = {{Fang, Wen Hai and Johansson, Thomas and Spaanenburg, Lambert}}, booktitle = {{Proceedings - 2005 International Conference on Field Programmable Logic and Applications, FPL}}, keywords = {{Behavioral Synthesis; Trusted Hardware; ISA-compliant IP-core; Stream cipher encryption; Pareto curve}}, language = {{eng}}, pages = {{281--286}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, title = {{Snow 2.0 IP core for trusted hardware}}, url = {{http://dx.doi.org/10.1109/FPL.2005.1515735}}, doi = {{10.1109/FPL.2005.1515735}}, volume = {{2005}}, year = {{2005}}, }